Notices by kat (boneidol@indy.im), page 40
-
kat (boneidol@indy.im)'s status on Tuesday, 30-Jan-2018 13:41:57 EST kat
I think it must be like that still in the 24th Century. When Picard says "send on all channels" he is just using the future equivalent of winPopup -
kat (boneidol@indy.im)'s status on Tuesday, 30-Jan-2018 13:39:24 EST kat
Remember when people used to put their Windows 98 computers straight on the Internet, and you could send UDP broadcasts to message strangers using `net send` -
kat (boneidol@indy.im)'s status on Tuesday, 30-Jan-2018 12:08:39 EST kat
Hope this happens https://www.theguardian.com/science/2018/jan/30/jodrell-bank-telescopes-nominated-unesco-world-heritage-site -
kat (boneidol@indy.im)'s status on Tuesday, 30-Jan-2018 10:31:37 EST kat
@lnxw48a1 thats not really the metaphor I wanted hear. In conversation from indy.im at 32°58'59"N 49°7'59"E permalink -
kat (boneidol@indy.im)'s status on Tuesday, 30-Jan-2018 10:03:53 EST kat
!listening https://youtu.be/s0VQMeoOR2c Egyptology In conversation from indy.im at 32°58'59"N 49°7'59"E permalink Attachments
-
kat (boneidol@indy.im)'s status on Friday, 17-Oct-2014 10:55:24 EDT kat
Been playing with a paper engima machine !cryptocourse http://www.pinterest.com/pin/391461392580852707/ I cant find the original site, but here is a copy https://imc.li/b99rs In conversation from indy.im at 32°58'59"N 49°7'59"E permalink Attachments
-
kat (boneidol@indy.im)'s status on Monday, 13-Oct-2014 16:02:12 EDT kat
takes about 0.5 sec on my laptop In conversation from indy.im at 32°58'59"N 49°7'59"E permalink -
kat (boneidol@indy.im)'s status on Monday, 13-Oct-2014 16:01:31 EDT kat
!cryptocourse given that password is a dictionary word, find the password that crypts to "tgbAxM/lepfg." In conversation from indy.im at 32°58'59"N 49°7'59"E permalink -
kat (boneidol@indy.im)'s status on Thursday, 09-Oct-2014 14:45:30 EDT kat
retro day at school !cryptocourse . Question was encrypt "jerusalemartichoke" with a vigenere cipher key is "ship" In conversation from indy.im at 32°58'59"N 49°7'59"E permalink -
kat (boneidol@indy.im)'s status on Thursday, 06-Mar-2014 04:23:39 EST kat
heh... you need some ancient latin literature to solve this too http://www.loyalty.org/~schoen/rsa/ http://en.wikipedia.org/wiki/Virgil#The_Aeneid In conversation from indy.im at 32°58'59"N 49°7'59"E permalink -
kat (boneidol@indy.im)'s status on Wednesday, 05-Mar-2014 04:13:56 EST kat
!cryptocourse Challenge http://www.loyalty.org/~schoen/rsa/ looks a bit of fun to test some RSA #fails In conversation from indy.im at 32°58'59"N 49°7'59"E permalink -
kat (boneidol@indy.im)'s status on Thursday, 20-Feb-2014 07:34:28 EST kat
rewatching http://www.youtube.com/watch?v=HJB1mYEZPPA The Year in Crypto [30c3] after finishing !cryptocourse In conversation from indy.im at 32°58'59"N 49°7'59"E permalink -
kat (boneidol@indy.im)'s status on Saturday, 15-Feb-2014 11:36:47 EST kat
Looking at week 6 !cryptocourse homework. Question 10 is fun. Alice and Bob want find out if they are in the same location, without revealing to each other where they are. Using Diffie Hellman Merkle they can In conversation from indy.im at 32°58'59"N 49°7'59"E permalink -
kat (boneidol@indy.im)'s status on Wednesday, 12-Feb-2014 13:50:29 EST kat
http://events.ccc.de/congress/2012/Fahrplan/events/5275.en.html In conversation from indy.im at 32°58'59"N 49°7'59"E permalink -
kat (boneidol@indy.im)'s status on Wednesday, 12-Feb-2014 13:39:41 EST kat
The moral is. If you don't be generate your prime numbers for #RSA well there are many attacks on it. In conversation from indy.im at 32°58'59"N 49°7'59"E permalink -
kat (boneidol@indy.im)'s status on Wednesday, 12-Feb-2014 13:33:25 EST kat
!cryptocourse week 6 programming challenge is quite fun. Factor weak #RSA keys. Very similar to the bulk factoring that was demonstrated at the 2012 #ccc In conversation from indy.im at 32°58'59"N 49°7'59"E permalink -
kat (boneidol@indy.im)'s status on Thursday, 06-Feb-2014 15:08:15 EST kat
Cool that you are still there. The course restarts straight away afterwords so its possible to revisit again quite quickly. In conversation from indy.im at 32°58'59"N 49°7'59"E permalink -
kat (boneidol@indy.im)'s status on Thursday, 06-Feb-2014 11:09:02 EST kat
!cryptocourse week 5 Homework ... first solution took 15 min to run, second 15 sec, third 3 seconds. In conversation from indy.im at 32°58'59"N 49°7'59"E permalink -
kat (boneidol@indy.im)'s status on Wednesday, 05-Feb-2014 04:46:17 EST kat
Which is comparable to the strength estimates here http://tools.ietf.org/html/rfc3526#page-8 In conversation from indy.im at 32°58'59"N 49°7'59"E permalink -
kat (boneidol@indy.im)'s status on Wednesday, 05-Feb-2014 03:54:32 EST kat
So if your AES Key for symmetric 256bit you should be using a 15360 bit DH prime for an equivalent level of security ( unless you are using Elliptic curves ) In conversation from indy.im at 32°58'59"N 49°7'59"E permalink