Matches for from:asciilifeform, 112685 total results Sorted by newest | relevance
Thu Aug 25 18:26:51 UTC 2016 <asciilifeform> lolk
Thu Aug 25 18:26:07 UTC 2016 <asciilifeform> dafuq do you need gavin's rubbish for, funkenstein_ ?
Thu Aug 25 18:25:08 UTC 2016 <asciilifeform> lel, heathendom problems.
Thu Aug 25 18:22:09 UTC 2016 <asciilifeform> funkenstein_: for the most part.
Thu Aug 25 18:18:27 UTC 2016 <asciilifeform> funkenstein_: rubbish home routers, webcams, etc. often have these.
Thu Aug 25 18:16:49 UTC 2016 <asciilifeform> (ask Framedragger how, this was his piece.)
Thu Aug 25 18:16:39 UTC 2016 <asciilifeform> we have gpg keys, largely (though not entirely) from sks, and a large number of synthetically generated gpg keys from rsa moduli taken from ~ssh~ portscan on ipv4 space.
Thu Aug 25 18:16:08 UTC 2016 <asciilifeform> (as of yet)
Thu Aug 25 18:16:03 UTC 2016 <asciilifeform> funkenstein_: we don't have any ssl keys in phuctor.
Thu Aug 25 18:15:35 UTC 2016 <asciilifeform> or hash of some string user puts in, say, sha512('john smith jr') gets you same privkey each time.
Thu Aug 25 18:14:36 UTC 2016 <asciilifeform> other possibilities are - hash of real time clock millisecond counter, say.
Thu Aug 25 18:14:01 UTC 2016 <asciilifeform> funkenstein_: this is not impossible.
Thu Aug 25 18:12:12 UTC 2016 <asciilifeform> (quite likely the seed for the prng is, e.g., the unit serial number.)
Thu Aug 25 18:10:19 UTC 2016 <asciilifeform> theoretically, a braindamaged router could be capable of generating, say, 1,000,000 different ssh privkeys, and this would result in ~1 phuctoring per 2 million installed units. but if we knew the prng algo we could break the entire lot.
Thu Aug 25 18:08:53 UTC 2016 <asciilifeform> funkenstein_: presently, i have nfi whether the software (buncha proprietary router turdware) or vendor hardware, or both, is the magic ingredient
Wed Aug 24 19:15:52 UTC 2016 <asciilifeform> if i did, we would have never met.
Wed Aug 24 19:15:46 UTC 2016 <asciilifeform> i did not in '07 when opened blog, nor now.
Wed Aug 24 19:15:21 UTC 2016 <asciilifeform> multiply p and q, wham, m.
Wed Aug 24 19:15:12 UTC 2016 <asciilifeform> and breaking rsa key is not cold fusion, does not take laboratory to replicate.
Wed Aug 24 19:14:50 UTC 2016 <asciilifeform> the results are on public www, kakobrekla .