Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

SICP

Name: Anonymous 2012-04-21 2:46

Hi /prague/
I'm currently reading SICP to learn LISP. The question is, what LISP do I have to install to follow the book ?
Common Lisp ? Scheme ? Another ?

Name: Anonymous 2012-04-23 0:53

it is not inconceivable that they can craft a flaw into the code that is met in only edge (or designed) cases that most hackers wouldn't immediately see.

You're really overestimating the intelligence of American pigs.

I don't see why you would think so, but it need not be American anyway. The Chinese and Russian governments could easily want the same, as could more sinister organizations that plan to rule us.

This does nothing to prevent adversaries who can control the method of communication used to share keys.

Key signing party, faggot.

That doesn't save you from bad binaries caused by a compromised system.

I'll have you know that I have many friends.

Unfortunately, they're all imaginary.

Ad hominem. This is not proper argument. I've shown you respect, now I must demand that you remain courdial too.

There could be many flaws in the mathematics of RSA

Unlikely.  And signing uses DSA.  This subthread is about signing.  Also, for encryption, you don't have to use RSA.

I was using RSA as an example. DSA could have unknown (to us) weaknesses just like any other algorithm.

brute force attacks using classified computer systems, large criminal botnets

Not if your algorithm and security parameters are worth a shit.

Perhaps the computers of the advesaries are simply better? We don't know what's going on in those multi-billion dollar\euro research labs. I suspect that they have quantum computers that can make short work of any public-private key cipher systems.

plain old stealing of the key and modifying files without the knowledge of the owner.

LUKS.  Sure, you can fuck with the BIOS' firmware in their absence to install some sort of backdoor, but that's many orders of magnitude more difficult than just installing a hardware keylogger.

Fine, install the keylogger. It doesn't refute the fact that your system is vunerable.

Typical childish behavior.

Fuck you you gurgling cockpustule.

This shouldn't even be posted.

Or they can manufacture the processors, be it the company for the government, or the factory modifying it for other means without the designer's knowledge.

Ah yes, the good old ``CPU detects hard-coded 128-bit value on load and activates exploit in microcode''.  Once again, you're overestimating the American pigs' intelligence.  And what's the point of all that when you can just buy some microcontroller and program it to do encryption or whatever activity the Man doesn't like.  Or, hell, build it out of 7400's.

Once again, you are not refuting my point, you are just hand-waiving. It could be anybody.

Because there is no method of mass exploitation in that. With the OS or CPU lines compromised, anyone could be targeted on a whim without even being close.

Microsoft Windows and Apple Mac OS X closed-source operating systems are installed onto probably 97% of world's computers, maybe more.  I'd say that as far as mass exploitation goes, they're doing pretty damn good.

But *nix run on all the interesting systems. Only neurotypicals use those OSes, and are the type to get virii from porn because they are completely oblivious about security. They would never even bother with encryption. Anyone who will ever be bothered is running a *nix OS.

Just send a few odd bytes in the .tar during a write operation and there you go.

I'm sure any security vulnerabilities in the tar utility have long been discovered.

That is why they would alter tar. No one would suspect that tar would have a back door that would return the wrong data. It is your blind trust that will destroy you.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List