home | log | search | bash | stats | wiki


Matches for ninjashogun, 1788 total results Sorted by newest | relevance

Tue Mar 18 02:10:03 UTC 2014  <dignork>   ninjashogun, that's because a) people store useless trash on their systems and don't care/ b) they calculate the risks and live with it

Tue Mar 18 02:09:02 UTC 2014  <ninjashogun>   nobody is this paranoid :)

Tue Mar 18 02:08:47 UTC 2014  <ninjashogun>   dignork - if what you are saying is true than there should be a huge market for a USB wifi stick that is just 8 feet of shielded USB cable with a power conditioner on either end, so that your wifi transmission happens the fuck away from your CPU.

Tue Mar 18 02:07:54 UTC 2014  <dignork>   ninjashogun, so you keep your key off your computer, to avoid exactly that

Tue Mar 18 02:07:27 UTC 2014  <ninjashogun>   dignork - because all computers obviously already leak some information through faint EM

Tue Mar 18 02:07:13 UTC 2014  <ninjashogun>   dignork - but above and beyond what the computer leaks anyway by itself?

Tue Mar 18 02:06:32 UTC 2014  <dignork>   ninjashogun, as simple as possible, wifi transmitter on key-storage device will leak cpu state of key-handling process, game over.

Tue Mar 18 02:04:34 UTC 2014  <BingoBoingo>   ninjashogun: Maybe you are the wrong audience as you aren't concerned very far

Tue Mar 18 02:03:27 UTC 2014  <ninjashogun>   personally anyone who could bruteforce all that, while breaking wireless encyrption and your whole network stack, can see the damn document as far as I'm concerned. and they still wouldn't have my private key.

Tue Mar 18 02:02:39 UTC 2014  <ninjashogun>   asciilifeform, I don't even mena to "sign" a single document. Just to transmit it. And receive back hte signed version.

Tue Mar 18 02:02:15 UTC 2014  <ninjashogun>   asciilifeform, further, as a practical matter you are not being asked to transmit a real key. You are just transmitting a stupid session key that is used to sign a single document. And if that session key is used in javascript, which is VERY far from the metal (it's a VM, running in interpreter, JS running in a C++ program, firefox, running on Windows) you would have to have insnae precision on learning exact CPU state.

Tue Mar 18 02:00:23 UTC 2014  <ninjashogun>   asciilifeform, anything that leaked one bit, could be repeated until you have them all. It only works if you can't learn any of them, except by brute-forcing all of them together.

Tue Mar 18 01:59:55 UTC 2014  <ninjashogun>   asciilifeform, I get your point but obviously if you can learn a single bit of a key, you can learn them all. Not one bit should be leaked, ever.

Tue Mar 18 01:58:42 UTC 2014  <ninjashogun>   asciilifeform, I've done that :)

Tue Mar 18 01:58:24 UTC 2014  <asciilifeform>   ninjashogun: your second homework is to play ussr national anthem using a pc, c or cpp program, and a shortwave radio.

Tue Mar 18 01:56:15 UTC 2014  <asciilifeform>   ninjashogun: your homework is to prove, given K bit rsa key with factors P,Q, there exists N, where N is number of bits you need to learn to factor into P,Q in polynomial time.

Tue Mar 18 01:56:03 UTC 2014  <ninjashogun>   nursing

Tue Mar 18 01:55:56 UTC 2014  <ninjashogun>   BingoBoingo: I hate to be the one to break it to you. I thought you heard. /. had a stroke and is in a nurinsg home :(

Tue Mar 18 01:55:17 UTC 2014  <ninjashogun>   oops

Tue Mar 18 01:55:08 UTC 2014  <ninjashogun>   hn is hackernews normally

« Previous Page    Next Page »