log☇︎
165 entries in 0.177s
fromphuctor__: you could collect many millions keys from SSH server using the ssh-keyscan utility included in OpenSSH
fromphuctor__: i have an idea for phuctor
fromphuctor: Thank you. Have a good day.
fromphuctor: Thank you very much for your efforts and help. I sincerely appreciate it.
fromphuctor: Apologies. I'm not that good at cryptography.
fromphuctor: My SSH keys came when I used the ssh-keygen command. How do I export them?
fromphuctor: How do I do that?
fromphuctor: Would that be a good assumption to make?
fromphuctor: So my SSH keys are probably not compromised, assuming my cryptography software wasn't broken by the government.
fromphuctor: Why were these keys so easy to crack? Were they due to faulty implementations of the cryptosystem?
fromphuctor: Oh. That's really bad, isn't it?
fromphuctor: Okay. So apparently a lot of people messed up their cryptography, and had non-prime exponents (or very small primes) for some weird reason.
fromphuctor: Wouldn't a bigger prime exponent be more difficult for an adversary to crack?
fromphuctor: Okay. So the size of the prime number does not matter that much for the security of the cipher as the entrophy source.
fromphuctor: How are these prime numbers chosen? I understand it is very hard to find prime numbers.
fromphuctor: I'm reading the linked post now.
fromphuctor: It's a public key encryption scheme, right?
fromphuctor: What does it mean whe the public exponent is not prime?
fromphuctor: nah, ill take your compan's info
fromphuctor: sure, ill wait for mircea
fromphuctor: im not asking for sympathy, Im asking you to remove my name and information from your website
fromphuctor: I'm pretty sure I uploaded it to sks years ago
fromphuctor: right, and I want that removed
fromphuctor: sounds solid
fromphuctor: im not concerned about the key floating around, just the other information listed on nosuchlabs
fromphuctor: do you maintain the database for nosuchlabs
fromphuctor: that doesnt answer my question
fromphuctor: if my info disappeared from sks, would it be removed from nosuchlabs
fromphuctor: which country is that
fromphuctor: im pretty sure there's laws in place that give me the right to have that info removed ☟︎
fromphuctor: I'm aware of that
fromphuctor: I dont want the other associated info on the net
fromphuctor: not sure what that means but it's green
fromphuctor: GCD(N, Π(∀n)): 1 (Ok, for now!)
fromphuctor: sure it's to store my public gpg key
fromphuctor: no longer*
fromphuctor: danielpbarron. I have no idea, I longer use it
fromphuctor: I no longer use the key and I just dont want my info being indexed by google
fromphuctor: i havent but when I google my name it's only showing up at nosuchlabs.com
fromphuctor: so should I private message them or wait here?
fromphuctor: hello, how can I get my information removed from nosuchlabs.com? ☟︎☟︎
fromphuctor: thanks for the pointers in the right direction, have a great day
fromphuctor: until I stop getting 500
fromphuctor: provided that doesn't get me flagged.
fromphuctor: in the meantime, I'll probably script something that sends my file to Phuctor repeatedly until I stop getting an error.
fromphuctor: better, nice
fromphuctor: alright, sleeves need to be rolled up. I'll probably have to dig into ASN.1, extract the public keys, and then try factoring them with a kludged together Python script
fromphuctor: so I don't gain much by just running it locally without P
fromphuctor: gotcha
fromphuctor: so Phuctor's main advantage is that it retains the information it has gained by going through all the other keys?
fromphuctor: I'm mainly trying to determine if I have generated a key with bad entropy leading to bad primes meaning easy factorability
fromphuctor: sorry :-|
fromphuctor: and do I need P if I don't particularly care about collisions?
fromphuctor: gcd as in the math function? does it exist in a binary?
fromphuctor: is there code I can run locally to attempt to factor it and save Phuctor's CPU time?
fromphuctor: gotcha
fromphuctor: so it's most likely that phuctor's just too loaded right now?
fromphuctor: I figured it was either failing due to the key being too large or due to it not being published anywhere
fromphuctor: okay, I'll keep sending
fromphuctor: HTTP 500
fromphuctor: it's quite a large key with a few subkeys, total upload size is around 13K
fromphuctor: it's an as-of-yet unpublished GPG key because I wanted to make sure it's not easily factorable
fromphuctor: I'm unable to submit my GPG key online to Phuctor
fromphuctor: do I have a voice?
fromphuctor: hello