home | log | search | bash | stats | wiki


Matches for from:asciilifeform, 112685 total results Sorted by newest | relevance

Thu Aug 25 18:26:51 UTC 2016  <asciilifeform>   lolk

Thu Aug 25 18:26:07 UTC 2016  <asciilifeform>   dafuq do you need gavin's rubbish for, funkenstein_ ?

Thu Aug 25 18:25:08 UTC 2016  <asciilifeform>   lel, heathendom problems.

Thu Aug 25 18:22:09 UTC 2016  <asciilifeform>   funkenstein_: for the most part.

Thu Aug 25 18:18:27 UTC 2016  <asciilifeform>   funkenstein_: rubbish home routers, webcams, etc. often have these.

Thu Aug 25 18:16:49 UTC 2016  <asciilifeform>   (ask Framedragger how, this was his piece.)

Thu Aug 25 18:16:39 UTC 2016  <asciilifeform>   we have gpg keys, largely (though not entirely) from sks, and a large number of synthetically generated gpg keys from rsa moduli taken from ~ssh~ portscan on ipv4 space.

Thu Aug 25 18:16:08 UTC 2016  <asciilifeform>   (as of yet)

Thu Aug 25 18:16:03 UTC 2016  <asciilifeform>   funkenstein_: we don't have any ssl keys in phuctor.

Thu Aug 25 18:15:35 UTC 2016  <asciilifeform>   or hash of some string user puts in, say, sha512('john smith jr') gets you same privkey each time.

Thu Aug 25 18:14:36 UTC 2016  <asciilifeform>   other possibilities are - hash of real time clock millisecond counter, say.

Thu Aug 25 18:14:01 UTC 2016  <asciilifeform>   funkenstein_: this is not impossible.

Thu Aug 25 18:12:12 UTC 2016  <asciilifeform>   (quite likely the seed for the prng is, e.g., the unit serial number.)

Thu Aug 25 18:10:19 UTC 2016  <asciilifeform>   theoretically, a braindamaged router could be capable of generating, say, 1,000,000 different ssh privkeys, and this would result in ~1 phuctoring per 2 million installed units. but if we knew the prng algo we could break the entire lot.

Thu Aug 25 18:08:53 UTC 2016  <asciilifeform>   funkenstein_: presently, i have nfi whether the software (buncha proprietary router turdware) or vendor hardware, or both, is the magic ingredient

Wed Aug 24 19:15:52 UTC 2016  <asciilifeform>   if i did, we would have never met.

Wed Aug 24 19:15:46 UTC 2016  <asciilifeform>   i did not in '07 when opened blog, nor now.

Wed Aug 24 19:15:21 UTC 2016  <asciilifeform>   multiply p and q, wham, m.

Wed Aug 24 19:15:12 UTC 2016  <asciilifeform>   and breaking rsa key is not cold fusion, does not take laboratory to replicate.

Wed Aug 24 19:14:50 UTC 2016  <asciilifeform>   the results are on public www, kakobrekla .

« Previous Page    Next Page »