800+ entries in 0.091s
diana_coman: asciilifeform, yes, get eucrypt and run the tests for smg_rsa, something like ./tests 11 11 (i.e. 11 times test no 11)
☟︎ a111: Logged on 2018-07-07 13:47 spyked: asciilifeform, phathub file contains
RSA e and N only. but that's a good point, should also post the other ones under some raw form.
mircea_popescu: it's the direct equivalent of a key, actually. if you regard a
rsa key as "a succession of 2048 binary questions" to which one gives exactly correct answers ; then ~choices you make~ are ultimately the basis of identity.
spyked: asciilifeform, phathub file contains
RSA e and N only. but that's a good point, should also post the other ones under some raw form.
☟︎ a111: Logged on 2018-06-26 20:27 mircea_popescu: come to think of it, why am i even having "a wallet", as opposed to say a
rsa'd privkey list.
mircea_popescu: come to think of it, why am i even having "a wallet", as opposed to say a
rsa'd privkey list.
☟︎ lobbesbot: phf: Sent 2 hours and 54 minutes ago: <asciilifeform> other interesting observations: 1) loader is not the same as what appears in the src, in either 3.3 or 3.4 fw bin; not only key differs, but eggog strings, and possibly the
rsa per se. 2) seems like : nowhere else in the fw is there any other routine which checksums/rsaverifies the cr50 fw , or references the
rsa keyz at all other than to print keyid .
a111: Logged on 2018-06-22 18:17 asciilifeform: static const uint32_t LOADERKEY_A[RSA_NUM_WORDS + 1] = { ...blah... } where #define RSA_NUM_WORDS 96 ...
a111: Logged on 2018-06-22 18:03 asciilifeform: in other lulz, nobody noticed this puzzler, so i'ma put it in the l0gz :
https://archive.li/i7BRf << cr50 magic
rsa keys; the montgomery multiplier etc uses hardcoded constant, 96 word ( i.e. 3072 bit ) for the mults, but the keyblobs are 97 , for some strange reason, in size...
mircea_popescu: it's supposed to be in enemy hands, as part and parcel of what
rsa asym cipher is.
a111: Logged on 2017-10-17 05:59 jurov: "The flaw resides in the Infineon-developed
RSA Library version v1.02.013, specifically within an algorithm it implements for
RSA primes generation. "
a111: Logged on 2018-06-11 15:46 asciilifeform: one interesting observation, is that the update mechanism lets you flash in arbitrary crapola into 'rw' section ( it simply won't jump to it if it doesn't pass
rsa(sha256(payload)) ) . so theoretically could put a nop sled there, ending with jump into the magic half of unlock routine. and then expose the thing to beta/gamma, and perhaps in a few months it will Do The Right Thing
a111: Logged on 2018-06-11 15:46 asciilifeform: one interesting observation, is that the update mechanism lets you flash in arbitrary crapola into 'rw' section ( it simply won't jump to it if it doesn't pass
rsa(sha256(payload)) ) . so theoretically could put a nop sled there, ending with jump into the magic half of unlock routine. and then expose the thing to beta/gamma, and perhaps in a few months it will Do The Right Thing
mircea_popescu: alright. see the topic / read the logs / register a
rsa key etc.
a111: Logged on 2018-06-11 15:46 asciilifeform: one interesting observation, is that the update mechanism lets you flash in arbitrary crapola into 'rw' section ( it simply won't jump to it if it doesn't pass
rsa(sha256(payload)) ) . so theoretically could put a nop sled there, ending with jump into the magic half of unlock routine. and then expose the thing to beta/gamma, and perhaps in a few months it will Do The Right Thing
mircea_popescu: listen, why not get yourself a
rsa key, a proper irc set-up, choose a name that's not retarded and start a blog, publish the respective bits...
mircea_popescu: anyway ; basically old lizzards hold exact same pov as tmsr, keeping
rsa keys and letting the bumbling kiddies play about with the ecc.
mircea_popescu: after all the "
rsa is broken because we've been misimplementing it for 20 years under our governmentalpg brand hurr" stories, it'd be quite pleasant.
lobbes: conceivably, the 'pre-prepared !!v string' method also has the advantage that when tmsr transitions its infrastructure to be using tmsr-
rsa, you won't need to recode your botworks
a111: Logged on 2018-05-25 22:44 mircea_popescu:
http://btcbase.org/log/2018-05-25#1818735 << is is settled that
rsa checks are waste of time / undesirable ? having a sane process doing kernel check may not be terrible, neh ?
a111: Logged on 2018-05-25 15:47 phf: so an intermediate step that someone else could perform is to take your rockchip gentoo, generate new
rsa pair, sign the kernel with pub, patch google's uboot with priv and get a clean booting rockchip gentoo setup, without accidentally bricking the device? (while still retaining known amount of google in the system)
a111: Logged on 2018-05-25 15:44 phf: and i guess you're trying to replace google's uboot with a built-from-src one, that doesn't also have
rsa checks etc.
phf: so an intermediate step that someone else could perform is to take your rockchip gentoo, generate new
rsa pair, sign the kernel with pub, patch google's uboot with priv and get a clean booting rockchip gentoo setup, without accidentally bricking the device? (while still retaining known amount of google in the system)
☟︎ phf: and i guess you're trying to replace google's uboot with a built-from-src one, that doesn't also have
rsa checks etc.
☟︎ mimisbrunnr: Logged on 2018-05-23 00:20 douchebag: -----BEGIN
RSA PUBLIC KEY-----
douchebag: ssh-keyscan -t
rsa github.com | sed "s/^[^ ]* //" > github.pub
douchebag: ssh-
rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnGPcqozjoIC989MI+KKzeWIhGupgUQlbhHp0rXlAmvRHUIJHFqmcIPA9wW6Q46mOg7EdS27H/9qgREFbZOqf8CAcVMUWyJ4AhFCTcmt0uv0ETVWwqT1/puJ92/qK6ycpzR0xWeUTsQwXEemMQsR8f4fA9OiH8rIAXV2zesQbg4sijeadcK3a3FEwyowU1WsqYqOxpK2HDl7vAiOu5RXI2Ed6Bmmt/z+9S4SdNBdrGwK1VT886HERQOlaIWy0dh1u8O9g8zmhUiNwhOw7HsmvmuFp39tKQw1hnAXd6JrU4qrklOgV2lFQLcLMSRKHWRj1nuHiJ/QNK2Mud3WwWnD5R
mircea_popescu: asciilifeform, why else all the pretense, you know. bitpay exists to "please stop using bitcoin", keybase exists to "please stop using
rsa", the WHOLE point of the usg ersatzen is exactly this, to get the sort of retard who can't tell the difference between item and usg.fake to stop using item.
mircea_popescu: afaik the idea is to go to our own
rsa eventuyally anyway
a111: Logged on 2018-05-11 15:42 mircea_popescu: "the
RSA supercollider and numerical observatory" << ahahaha i like this. a numerical observatory.
a111: Logged on 2016-08-16 21:03 mircea_popescu: it's not "the sks server" that is retarded. is the concept of machine-spread
rsa key that's retarded ; much in the way of "machine-generated trust", be it embodied in "dao" or "colored coins" or "safe bitbet"
a111: Logged on 2016-08-16 21:03 mircea_popescu: it's not "the sks server" that is retarded. is the concept of machine-spread
rsa key that's retarded ; much in the way of "machine-generated trust", be it embodied in "dao" or "colored coins" or "safe bitbet"
mircea_popescu: my only concern here is whether this actually invalidates the e, N, comment republican format, as a
rsa key format.
a111: Logged on 2018-05-11 13:46 asciilifeform: nao ! at some point i'ma rewrite it. again. and build it around 'naked'
rsa moduli, and with variant types of indices, etc. but i have nfi when i will get a chance to do this.
mircea_popescu: "the
RSA supercollider and numerical observatory" << ahahaha i like this. a numerical observatory.
☟︎ mircea_popescu: anyway, honestly nfi what's so magical about gpg in your mind. they're just as
rsa keys as the ssh set ; and just as debian, and etcetera.
a111: Logged on 2017-10-17 05:59 jurov: "The flaw resides in the Infineon-developed
RSA Library version v1.02.013, specifically within an algorithm it implements for
RSA primes generation. "
fromdeedbot: hey guys so I did register my
RSA key to deedbot as "fromdeedbot" but i got it working. I'm learning a lot of things are new to me right now so please xcuse me ahead of time if i do something in bad from, it's not on purpose
a111: Logged on 2018-05-04 03:25 mircea_popescu: so there, you have a pretty great plan for yourself out of this convo. keep doing dayjob to keep food on table. meanwhile a) deliver for trinque, deliver the
rsa pubkey crawl and b) talk to potential employees, get them in the wot. then as all this matures you can pivot into your desired research firm securely and from a position of unmatrched strength.
mircea_popescu: so there, you have a pretty great plan for yourself out of this convo. keep doing dayjob to keep food on table. meanwhile a) deliver for trinque, deliver the
rsa pubkey crawl and b) talk to potential employees, get them in the wot. then as all this matures you can pivot into your desired research firm securely and from a position of unmatrched strength.
☟︎ a111: Logged on 2018-05-01 21:44 mircea_popescu: it occurs to me that ~for the first time~ in the history of computing, we have hardware capable of on the fly
rsa-ing.
mircea_popescu: douchebag, phuctor is a
rsa super-collider, it uses some advanced maths to try and factor
rsa keys. so far managed to factor about 2000. it needs to be fed, moduli. which is what you'd be doing, looking for all
rsa moduli known to the internet. you understand what
rsa is and how it works, what a modulus is, what N is and so on yes ? (if no -- straight to the library with you).