Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-4041-8081-120121-160161-200201-240241-

Cryptography [PART I]

Name: Cryptography 2012-10-16 22:36

Cryptography

Name: exploiting ignorance 2012-10-16 22:42

exploiting ignorance

Name: Anonymous 2012-10-16 22:48

Name: Anonymous 2012-10-16 22:53

>>3
Kikes are pretty smart. What about it?

Name: Anonymous 2012-10-16 22:54

I was thinking about a very simple steganographic technique to simulate the noise floor for lossless image formats.  It assumes that the input bitstream is already encrypted and has uniform distribution.  The algorithm is as follows:  Divide the image into 2x2 pixel blocks.  Consider the MSB of each pixel in a block.  If it's not ((1,0),(0,1)) or ((0,1),(1,0)), then skip to the next block.  Take a bit from the input; if it is 0, replace the block's pixels' MSBs with ((1,0),(0,1)); otherwise, replace them with ((0,1),(1,0)).  Repeat the process until you run out of input bits.  The main disadvantage of this technique is, of course, that the vessel data needs to be 32 times larger than the signal.  But at least it should be very hard to detect.

>>2
I don't get it.

Name: Anonymous 2012-10-16 22:55

>>3 proves that VIPPER was actually right all along; FFP and the jew spammer are the same person.

Name: Anonymous 2012-10-16 22:56

Why does >>3 prove that, >>6-kun?

Name: Anonymous 2012-10-16 23:02

>>7
Although they ``both'' post within the same hours, they never post at the same time. And now that FFP found a new way to enrage neckbeards (by spitting on cryptography), the jew spammer decided to do the same. Could be just coincidence, of course.

Name: Anonymous 2012-10-16 23:04

>>8
Oh, okay.

Name: Anonymous 2012-10-16 23:05

>>8
they never post at the same time
I have yet to see two people posting at the same time in this board.

Name: Anonymous 2012-10-16 23:33

Name: Anonymous 2012-10-16 23:41

>>11

vim ~/.mozilla/firefox/profiles/.../HTTPSEverywhereRules/world4ch.xml

<ruleset name="World4ch">
  <target host="dis.4chan.org" />

  <rule from="^http://(dis\.)?4chan\.org/" to="https://dis.4chan.org/"/>
</ruleset>

Name: Anonymous 2012-10-16 23:51

>>12
vim
Strike 1.
firefox
Strike 2.
xml
Strike 3. Stopped reading.

Name: Anonymous 2012-10-17 3:22

>>10
I see several people posting concurrently on this board pretty damn often.

Name: Anonymous 2012-10-17 9:56

>>5
Interesting; have you tested your technique against steganalysis tools?

Name: Anonymous 2012-10-17 10:07

>>11
hey i posted both of those

Name: Anonymous 2012-10-17 11:31

>>15
I have not tested my anal techniques against a stegosaurus. Why have you asked?

Name: Anonymous 2012-10-18 1:09

>>5
I wonder if this would work for audio.  On a related note, I wonder how I can get some proper vessel files; I suppose I could just record myself playing the piano and save the file as uncompressed 32-bit FLAC.

Name: Anonymous 2012-10-18 2:30

>>18
If you're going to use steganography, perhaps broadcasting the format and contents of your vessel files on the Internet is not such a great idea.

Name: Anonymous 2012-10-18 11:40

>>19
uncompressed 32-bit FLAC
holy jesus

Name: Anonymous 2012-10-18 12:46

>>20
Nothing's stopping him from compressing the audio after recording

Name: Anonymous 2012-10-18 12:48

>>20
Fine, losslessly-compressed audio. Happy now, Captain Autism?

Name: Captain Autism 2012-10-18 12:56

I am quite happy without having to listen to your shit!

Name: Anonymous 2012-10-18 13:17

>>21
Lossily-compressing audio most likely destroys all steganographically-hidden data in it.

Name: Anonymous 2012-10-18 13:26

>>24
Not if you wrote it the right way.

Name: Anonymous 2012-10-18 13:31

>>24
If you're going to need that sort of requirement, it'd also be your responsibility to write a compliant encoder. Since the FLAC encoder is free, it'd be relatively trivial to do this with FLAC.

Name: Anonymous 2012-10-18 13:36

>>26
FLAC is lossless. This means that no matter what input stream you encode with it, when you decode it you get back the exact same thing bit-for-bit (they even store a MD5 checksum of the uncompressed stream).

On another note, I don't know how you're going to get enough entropy to cover 32 bits of PCM out of a regular DAC that has probably 12 or 14 bits of resolution. I would suggest sticking to 8 bits.

Name: Anonymous 2012-10-18 16:02

>>27
Cryptography thread
FLAC
...
imouttahere.png

Name: Anonymous 2012-10-18 17:47

>>28
/le backseat bop/

Name: Anonymous 2012-10-18 18:10

>>28
fuck off, retard

Name: Anonymous 2012-10-20 2:08

>>2
What do you mean?

>>1
Here's an interesting problem; is it possible to do public key steganography (i.e. with no shared secret)?

Name: >>31 2012-10-20 2:33

exploiting mistakes made by those that are ignorant to the proper use of cryptography

Name: >>2 2012-10-20 2:34

I meana respond to >>31

Name: Anonymous 2012-10-20 2:55

>>31

I want to say no. Steganography is about making information obscure. To find the information, you need to know where to look and how it is encoded. The ``where to look'' and ``how it is encoded'' form a weak private key if you will. Although this isn't a substitute for encryption, because ``where to look'' can be brute forced by performing analysis on every piece of information that could possibly contain steganography. And ``how it is encoded'' can be brute forced by trying many known encodings. If the encoded information is not encrypted, it can be reassembled.

You can use public and private key cryptography to encrypt your messages and then transmit them using steganography. Raw encrypted data is obvious to an ease dropper. But encrypted data within steganography takes more analysis to detect.

Name: Anonymous 2012-10-20 3:13

>>34
Steganography is used to hide the evidence of transfer.

For example, alternating in your mail synonyms of the same word, you can provide a binary stream.

Name: Anonymous 2012-10-20 3:17

>>34
encrypt your messages and then transmit them using steganography.
If Mossad finds that, they will rape your anus and you will tell them all your passwords.

Name: Anonymous 2012-10-20 3:35

>>35
I guess the ease of detection depends on how much information you are trying to pack. One bit or two per email would be impossible to detect. But if your needs demand more throughput, it will look more obvious.

Name: Anonymous 2012-10-20 3:39

>>37
Just send a few Bible chapters, matching you pattern.

That is how Rabbies encode "kill christian babies" message into Talmud.

Name: Anonymous 2012-10-20 3:48

>>36
And that's why you have two keys: one that decrypts to the original message, and one that decrypts to a plausible but fake one. If you use an OTP it's trivial and impossible to prove.
Two Mossad agents operating in the US in the '70s actually did exactly that.

Name: Anonymous 2012-10-20 3:48

>>36

come   and        get
me        bro      I'
m doing          it 
        now   as I  
                 type
 this   and     you'l
l     never         
   know             
                    
     what  I'm saying
               never!

Name: Anonymous 2012-10-20 3:55

>>38

But there is a problem. When you encode your information into the bible, you will modify it slightly and the differences encode your message. However, an ease dropper will recognize the writing as the bible. All they have to do is correctly guess the exact copy you used and do a diff to get an encoding of your message. The message may still be encrypted, but if this is in the right context, this is enough to provoke suspicion.

If you are going to transmit a large amount of data using stenography this way, you should use a large original data set that is not publicly available so that the ease dropper cannot get a copy of the original to compare it to.

Name: Anonymous 2012-10-20 3:58

>>41
You dont encode, you just pick matching page.

Name: Anonymous 2012-10-20 4:01

>>42

that too is an encoding. The page number is the encoded value and this value can be determined by indexing the pages of the bible and performing a look up.

As before, it isn't a big deal if the encoded values are encrypted. But if the encoding is noticeable then the stenography didn't work.

Name: Anonymous 2012-10-20 4:06

>>43
not a page number, but the content of the page (i.e. number of comas/whitespaces)

Name: Anonymous 2012-10-20 8:32

ease dropper
What.

Name: Anonymous 2012-10-20 8:43

>>45
Here's a nice Javascript quiz for you to try.
http://a4esl.org/q/j/ck/ed-punct01.html

Name: Anonymous 2012-10-20 16:27

>>34
But encrypted data within steganography takes more analysis to detect.
Well, it would be pretty silly to use steganography not in conjunction with an encryption scheme.  Now I think it should be possible to steganographically hide a public key encrypted message as long as there are no visible unencrypted headers (and that the public key structures have uniform distribution in all their bits, which I don't think holds for all ciphers although it might be possible to adapt for some).  But yeah, for decryption, one would have to try every steg encoding scheme against every private key in storage.

Name: Anonymous 2012-10-21 1:10

>>41
ease dropper
I laughed so much I almost fell off my pedal stool.

Name: Anonymous 2012-10-21 6:36

"Haruhi-chan, have you read about public key cryptography?"
"Cryptography? Uh..."
Wait a minute. What does cryptography have to deal with Nagato? I thought you were her therapist and this would be more psychobabble. Just what is going on here?
"Secret messages? Encryption, internet security, does that give you a hint?"
"I uh eh..."

Asahina-san made a hand gesture calling Haruhi's attention. "Earth to Haruhi, Earth to Haruhi, do you read me, Haruhi?"
"Eh? Oh, sorry! It's just that this government business caught me off guard..."
Asahina-sensei chuckled. "It's understandable. Kyon-kun almost threw up the first time I met him and told him about me. So, Haruhi-chan, have you thought about the answer?"
"Uh, what was the question?"
"Public key cryptography."
"Hmmm let me see... I remember. It was about prime numbers."
"That's right. If you have two prime numbers, N1, and N2, by multiplying them you obtain a bigger number. If someone, let's say, Alice, wants to send a message to Bob, the only thing Bob needs to give Alice is the multiplied number N1*N2 = M, to encrypt her message. Bob can decrypt the message because he knows what N1 and N2 are."

Wait a minute... prime numbers, multiplying, what? I'm not very good at math, someone explain this to me.
"You seem confused, Kyon-kun. But I'll let Haruhi explain to you later. Or... you could look it up in Google."
Haruhi stared at me with an annoyed look. What? I'm still studying in High school, how was I supposed to know that?
"Anyway, if Alice wanted to obtain N1 and N2 from M to decrypt a message sent to Bob, she would need to run a supercomputer for years trying to guess what N1 and N2 are. So that's the basis for public key cryptography."
Haruhi nodded quickly, while I was just following her. Asahina-sensei continued with her speech.
"Do you know what would happen if somehow, this powerful encryption could be broken with a super-incredible computer?"
"Yes..." said Haruhi, holding her chin. "It would mean... that, all the internet would..."
Asahina-sensei finished explaining. "Nothing would be secure anymore. Private conversations, financial transactions, intelligence secrets, confidential documents, nothing would be safe. Nothing. Now, you must be wondering what this has to do with Nagato-san, right?"

Name: Anonymous 2012-10-21 11:42

Haruhi-``chan''? Who the fuck would call her like that?

Name: Anonymous 2012-10-21 11:54

>>50
You've never watched 涼宮ハルヒちゃんの憂鬱?

Name: Anonymous 2012-10-21 12:28

>>51
I did, but I don't remember anyone calling her like that.

Name: Anonymous 2012-10-21 15:56

>>48
pedal stool
Have you been shitting on your bicycle again?

Name: Anonymous 2012-10-21 17:25

>>53
Everybody sing along now...
The S&M man,
The S&M man,
The S&M man because he mixes it with love,
And makes the hurtin’ feel good.
The hurtin’ feel good.

Name: Anonymous 2012-10-21 19:50

New /prog/ challenge: write a secure and undetectable public key steganography system in less than 1000 lines in your favourite language.  You are allowed to use OpenSSL.

Name: Anonymous 2012-10-21 20:06

>>55
Nice dubs NSA-kun.

Name: Anonymous 2012-10-21 20:10

>>55
I'm too dumb for that.

Name: Anonymous 2012-10-21 20:14

>>55
Forget it, it's NP-complete.

Name: Anonymous 2012-10-21 20:51

>>56
Why the hell would the NSA encourage or even suggest the creation of such software?

Name: Anonymous 2012-10-21 20:56

>>59
To see how the enemy thinks.

Name: Anonymous 2012-10-22 1:15

>>61GET!

Name: Anonymous 2012-10-22 1:55

>>60
I don't think public development of public key crypto+steganography is really in their insane mass surveillance interests.

Name: Anonymous 2012-10-22 14:11

one-time pad master race reporting in

Name: Anonymous 2012-10-22 15:48

>>63
doesn't work for public key, fagstorm

Name: Anonymous 2012-10-22 16:09

Is it true that if you extend the Enigma machine with two more rotors, it remains secure even today?

Name: Anonymous 2012-10-22 16:15

I steganographically store messages on /prog/ by selectively claiming certain strategic post numbers.

Name: Anonymous 2012-10-22 16:20

I steganographically store messages on /prog/ by inserting zero-width spaces.

Name: Anonymous 2012-10-22 19:09

I steganographically store messages on /prog/ by exploiting Unicode homoglyphs.

Name: Anonymous 2012-10-22 21:18

>>55
Does it have to be inside an image, or can it be audio or video?

Name: Anonymous 2012-10-22 21:59

I steganographically store messages on /prog/ by plunging  homosexuals.

Name: Anonymous 2012-10-22 22:26

I steganographically store messages on /prog/ by posting sequences of mutated sentences.

Name: Anonymous 2012-10-22 23:37

>>65-67,71
Does this explain the Jew spammer?

Name: Anonymous 2012-10-22 23:45

>>72
Considering the excruciatingly low signal-to-raise ratio, I'd say yes.

Name: Anonymous 2012-10-23 13:09

So, any cool free steganalysis tools or algorithm descriptions?

Name: Anonymous 2012-10-23 13:18

>>66
I get it now! Dubs are the alphabet of an encrypted message that takes months to emit.

Name: Anonymous 2012-10-23 13:28

>>74
Here's an idea: correlate (some of) the higher 7 bits against the lower one in unaltered signal, and notice the patterns that occur.

Name: VIPPER 2012-10-23 13:50

Fuck dubs. Eat shit dubs spammer.

Name: Anonymous 2012-10-23 14:06

>>75
Yes, and the message he is sending out is check my delicious doubles.

Name: Anonymous 2012-10-24 0:00

Name: Anonymous 2012-10-24 4:25

>>79
2012-10-24 00:00
Whoa, binary decuples for the date and decimal quadruples for the time.

Name: Anonymous 2012-10-24 16:17

>>77
nice dubz bro

Name: Anonymous 2012-10-27 6:40

Name: Anonymous 2012-10-27 19:12

Is it possible to use an element of randomness in cryptography?

Name: Anonymous 2012-10-27 19:20

>>83
Nothing is random, but yes.

When you generate a key of some sort, many programs tell you to do random shit and waggle your mouse around to generate entropy (and to make you look like a tit).

Name: Anonymous 2012-10-27 19:22

>>84
Everything is random

fix't, no need to thank me.

Name: Anonymous 2012-10-27 21:45

>>84
many programs tell you to do random shit and waggle your mouse around to generate entropy
Hello '90s snake oil. I'm glad we don't live in that decade anymore.

>>83
Stream ciphers are PRNGs.

Name: Anonymous 2012-10-28 0:19

>>86
How do you get entropy, then?

Name: Anonymous 2012-10-28 0:22

Name: Anonymous 2012-10-28 2:42

>>88
ANU Quantum Random Numbers Server
HAX MY ANU SERVER

My girlfriend actually came up with this one.  I guess she's read too much /prog/ over my shoulder.

Name: Anonymous 2012-10-28 2:45

>>87
I just record my girlfriend's current mood every few minutes.

Name: Anonymous 2012-10-28 3:10

>>89
disgusting normal-chan

Name: Anonymous 2012-10-28 3:44

>>91
chan
disgusting weeaboo faggo

Name: Anonymous 2012-10-28 4:21

>>91
Don't worry, we're both fairly autistic (although she's in denial).

Name: VIPPER 2012-10-28 5:27

>>93
NOT AUTISTIC ENOUGH!

GO AWAY MENTAL GOY.

Name: Anonymous 2012-10-28 5:38

>>93
/polecat kebabs/

Name: Anonymous 2012-10-28 7:26

>>94
That may surprise you, but I invented that meme.

>>95
I've been here for longer than you've been alive.

Name: Anonymous 2012-10-28 12:10

>>92
disgusting non-weeaboo faggo

>>96
that doesn't make you less of a ``faggo'' though
back to reddit with your ``girlfriend'' please

Name: Anonymous 2012-10-28 18:37

>>97
I'm not from ``reddit'', ``faggo''.

Name: Anonymous 2012-10-29 5:23

>>88
What's wrong with using the microphone input?

Name: Anonymous 2012-10-29 11:29

>>99
At least one retard would forget to turn up the microphone input volume, resulting in a generated key with ~2 bits of entropy.

Name: Anonymous 2012-10-29 11:32

>>100
Or to even connect a microphone, for that matter.

Name: Anonymous 2012-10-29 23:53

>>101
Or to even power on the computer, for that matter.

Name: Anonymous 2012-11-01 13:41

>>102
Or to even bump this thread, for that matter.

Name: Anonymous 2012-11-01 14:42

Name: Anonymous 2012-11-01 16:22

>>104
It's trivial to detect just by looking at the low bits of the image and noticing they're a lot more random than they ought to be.

Name: Anonymous 2012-11-01 17:27

>>105
It's not as easy as that, really, for the colour channels. There's a lot of noise in real images.
For the alpha channel, though, yes, absolutely.

Name: Anonymous 2012-11-01 18:30

>>106
It's not as easy as that, really, for the colour channels. There's a lot of noise in real images.
Try it!  See if you can tell.

Name: Anonymous 2012-11-02 0:27

Name: Anonymous 2012-11-02 0:47

I think what is needed right now is something like PGP, except with steganography.

Name: Anonymous 2012-11-02 1:04

Steganography is pointless and uninteresting, and it doesn't have anything to do with cryptography.

Name: Anonymous 2012-11-02 1:18

checkem

Name: Anonymous 2012-11-02 1:32

>>109
If you could make any signal appear to be random then I think you would be set. Maybe something like:

000  -> 0110100010011
001  -> 0001001001110
010  -> 1100100001110
011  -> 1001010011001
100  -> 0101011010011
101  -> 0010011110101
110  -> 0110100100011
111  -> 0010111101001

You know, just a function that takes a number and encodes it as a bit stream where the probability of the signal being one or zero is one half, and other properties of random signals are satisfied as well as possible.

Then you could use this with that one stenagraphy algorithm proposed by anonymous-kun where you encode a bit stream in the least significant bit of the color channels based upon whether it is consistent or not with another bit.

Name: Anonymous 2012-11-02 1:58

niggers

Name: Anonymous 2012-11-02 2:22

>>110
Bob is a free software developer.  He works on many things, including various DRM-breaking libraries and video codecs covered by software patents.  Bob uses a cryptographic anonymizing service to publish his work.  The police in his country somehow manages to get a search warrant for his computer.  Encrypted data is found, and the judge orders him to provide the passphrase.  Game over.

Name: Anonymous 2012-11-02 2:26

>>112
That's a pointless and easily-detectable expansion.  The problem with >>104,106's code (as well as any naive LSB encoding scheme) is that it the lowest bit will have a perfect uniform distribution, which is not the case in reality.

Name: Anonymous 2012-11-02 3:48

>>115
I wasn't going for a substitution, just interpreting the original signal as a large number and then representing the large number with an apparently random signal. I didn't explain that well.

The transformation could also be parameterized to yield an uneven distribution if that is desirable. But if you want it to correlate with the content in the image then that would require the original image to be a key, so it would require a shared secret.

Name: Anonymous 2012-11-02 13:19

>>116
I wasn't going for a substitution, just interpreting the original signal as a large number and then representing the large number with an apparently random signal. I didn't explain that well.
I don't understand.  If you want to magically give the input signal a perfect uniform distribution, just use any symmetric cipher that isn't shit.

Name: Anonymous 2012-11-02 14:11

>>114
Your fantasies of unwarranted self-importance have no bearing on the real world. Even granting all of your infantile premises, how would ``Bob'' use steganography without software that is also on his computer?

Name: Anonymous 2012-11-02 14:33

>>118
Your fantasies of unwarranted self-importance have no bearing on the real world.
Fuck off and die, dipshit.  Just because you're happy to suck software patent troll dick doesn't mean everyone is.

Even granting all of your infantile premises, how would ``Bob'' use steganography without software that is also on his computer?
The presence of steganographic software on a computer does not prove the existence of hidden data.  Although impractical, Bob could re-type in the steganographic software at every reboot and keep it in a tmpfs.

Name: Anonymous 2012-11-02 14:47

Name: Anonymous 2012-11-02 16:19

>>119
Fuck off and die, dipshit.  Just because you're happy to suck software patent troll dick doesn't mean everyone is.
Software patent trolls don't go around doing things for which steganography would be any kind of defense, and no amount of edgy werds changes that.

The presence of steganographic software on a computer does not prove the existence of hidden data.
That's pathetic. You think a court that would find you in contempt for not disclosing an encryption key would buy that?
For that matter, the presence of a file of apparently random data does not prove the existence of encrypted data either.

>>120
He got caught because he posted his program to a mailing list using his real identity. Steganography doesn't have shit to do with anything.

You skiddie cypherpunks are sad.

Name: Anonymous 2012-11-02 17:18

>>121
Software patent trolls don't go around doing things for which steganography would be any kind of defense, and no amount of edgy werds changes that.
For now.

That's pathetic. You think a court that would find you in contempt for not disclosing an encryption key would buy that?  For that matter, the presence of a file of apparently random data does not prove the existence of encrypted data either.
The difference is that you can convince a jury that apparently random data is very likely encrypted, but the argument that ``somewhere in the computer there might be some encrypted data but we haven't found any traces of it yet'' doesn't really work.  Unless you're in a witch trial or something.

>>120
He got caught because he posted his program to a mailing list using his real identity. Steganography doesn't have shit to do with anything.
I'm just saying that you can get in deep shit just by writing free software.

Also, supposing you have software-patent-covered or DRM-breaking software on your computer and you want to travel to another country.  Border searches are practically unlimited, and you are pretty much required to provide any passphrase to anything a border agent may find (if you want to ever see your laptop again, that is).

Name: Anonymous 2012-11-02 17:22

>>122
The difference is that you can convince a jury that apparently random data is very likely encrypted, but the argument that ``somewhere in the computer there might be some encrypted data but we haven't found any traces of it yet'' doesn't really work.  Unless you're in a witch trial or something.
Not only is that obvious bullshit (Why would you have the software if you weren't trying to hide anything? Even if you haven't actually hidden anything, no jury is going to buy that), steganography is the definition of security through obscurity. If they have your algorithm (in the form of the software you used), they have the data you tried to hide.

I'm just saying that you can get in deep shit just by writing free software.
Which is an entirely irrelevant point.

Name: Anonymous 2012-11-02 17:55

>>123
If they have your algorithm (in the form of the software you used), they have the data you tried to hide.
Aha, you don't understand steganography!  The rest of your post draws from your ignorance.

Name: Anonymous 2012-11-02 19:16

>>124
Abloobloo. If you have nothing to contribute, don't.
This thread was about cryptography. Let's get back to it.

Name: Anonymous 2012-11-02 22:00

>>117
The trick is to not require a private key, although I suppose a symmetric cipher with a plain text random key prepended to the message would do.

Name: Anonymous 2012-11-02 22:12

>>123
It is perfectly possible for steganography to use a key. But the purpose of steganography isn't to make it so they can't get the data, since that can be encrypted anyway. The goal is to hide the data's presence.

>>I'm just saying that you can get in deep shit just by writing free software.
>Which is an entirely irrelevant point.
It establishes a need for hiding information.

Name: Anonymous 2012-11-02 22:16

>>127
Why do you need someone to hold your hand through every fucking step of this conversation? Once they've found your data, which they will, you're back in the position that you yourself claimed would lead to a contempt charge for refusing to provide an encryption key.
I'm done with this argument. You're an idiot with a Hollywood/cargo cult grasp on security. Like steganography because it's cool, not because you want to pretend you need or it's good for anything.

Name: Anonymous 2012-11-02 22:18

>>126
Or just any well-documented random sequence that you xor with your data, à la OTP except not OT.
Randomly distributed data is actively bad for stego applications, though, because it stands out like a sore thumb.

Name: Anonymous 2012-11-02 23:25

>>128

We are responding to the same point. But it is perfectly possible for stenography to use a key. For instance, a scattered sequence of bits that weaves through a large collection of home photos some of which were deleted and partially overwritten with audio recordings. If the amount of encoded information is sufficiently low, how will you see the signal through the noise? Suppose they guess the exact algorithm that you used, any associated keys, and they extract the data. How will they know they have obtained the encrypted data instead of bits of random noise?

>>125
steganography is related in the it satisfies a related purpose.

Name: Anonymous 2012-11-03 5:08

>>128
Once they've found your data, which they will, you're back in the position that you yourself claimed would lead to a contempt charge for refusing to provide an encryption key.
Jesus fucking christ, how thick-skulled are you?

I'm done with this argument.
Good, get the fuck out.

Name: Anonymous 2012-11-03 5:19

>>126
The trick is to not require a private key, although I suppose a symmetric cipher with a plain text random key prepended to the message would do.
You can do public-key steganography, as long as you have some way to render the public key bits indistinguishable from random data.

Name: Anonymous 2012-11-03 6:47

>>132

I think that would be fine. Just create a fixed universal algorithm for extracting the public key from the medium. Like a facebook profile picture. But the public key must appear arbitrary, just like how it would look if the extraction algorithm was performed on an image with no key encoded in it. And throughout every step of using the public key, there couldn't be any tell tail signs of the key working correctly. If you perform the key extraction on an arbitrary image with no actual key in it, the gibberish key should function without error, as otherwise this would provide a means of identifying images without keys, which helps identify images that contain keys.

But then what exactly would the public key be used for?

Name: Anonymous 2012-11-03 10:39

>>130
You can steganographically hide data in a container that's only a few thousand (or, more realistically, dozen) times larger than the data itself, particularly if the algorithm by which you hid it is available. It's too easy to bruteforce.

>>133
Maybe you should read something like Applied Cryptography before you try to have this conversation.

Name: Anonymous 2012-11-03 12:53

>>133
That's not what I meant by ``public key bits''.  I mean the data structures inherent to the public key algorithm required to encrypt the session key.  Basically, you encrypt all your data with a random session key, then you encrypt the session key with a public key algorithm and you stick that as a header.  The point here is that while the encrypted data has normal distribution, the header might not.

Name: 135 2012-11-03 12:53

Uh, I meant uniform.

Name: Anonymous 2012-11-03 13:58

>>134
Their ability to find the data isn't the problem that's being solved here. It's the confirmation that they have found data in the first place that is being prevented. I think you are the one that needs to do some reading, kodak-san!~

https://en.wikipedia.org/wiki/Steganography

>>136
It sounds like all you have to do there is send the encrypted session key through a filter that gives it a longer and uniform distribution.

Name: Anonymous 2012-11-03 14:11

>>137
Fuck-all is being preventing. Checking whether recovered data is randomly distributed is trivial, and by your own admission they don't even need to prove they have every last bit of data; just that there's random data where non-random data is expected.
Don't insult my intelligence by linking to Wikipedia when you don't know anything about real-life cryptosystems.

Name: Anonymous 2012-11-03 14:20

>>138
Then make the encoding sparse. Only encode random data in places where random data is expected. Like the quiet white noise in a recording, etc.

Name: Anonymous 2012-11-03 14:22

>>139
Random data isn't expected anywhere except where it's deliberately put. That's the whole thing about random data.
And every stego scheme is still vulnerable to the ``problem'' you posited for simple crypto.

Name: Anonymous 2012-11-03 14:28

Name: Anonymous 2012-11-03 14:30

>>140
Random data isn't expected anywhere except where it's deliberately put. That's the whole thing about random data. And every stego scheme is still vulnerable to the ``problem'' you posited for simple crypto.
So you're saying that the LSB plane of an image has zero entropy (being completely determined by the other bit planes)?

Name: Anonymous 2012-11-03 14:39

>>140
what problem did I post? I don't know who I am.

>>142
In some cases ey could be right. For instance, in a screen cap where desktop background is all #00DDDD. If you look at the image and there is a light layer of noise present in areas that should all be constant, then that is a sign. If there are objects in reality that have the same consistent color pattern all the way down to the least significant bit, then it will show there as well. There are algorithms that target regions of the image with high gradient to avoid this problem.

Name: Anonymous 2012-11-03 14:39

>>142
Sure is straw man in here.

Name: Anonymous 2012-11-03 14:42

>>144
Random data isn't expected anywhere except where it's deliberately put.

Name: Anonymous 2012-11-03 14:52

>>145
``Random'' is a word that has meaning. And that meaning isn't ``zero entropy''.

>>143
Just... stop talking.

Name: Anonymous 2012-11-03 15:12

>>146
Why don't you just stop volunteering to read what I type?

Name: Anonymous 2012-11-03 15:25

>>147
What you're typing is actively degrading an already toilet-scrubbing-level discussion.

Name: Anonymous 2012-11-03 15:27

>>147
Use a tripcode so we can automatically filter your posts. Otherwise, you're just deliberately creating noise.

Name: Anonymous 2012-11-03 15:34

>>148-149
Fuck you faggot, eat shit and die.

check my rude bump

Name: Anonymous 2012-11-03 15:40

What were we talking about again? Oh yeah.

>>148-149

<>" PROG CHALLENGE [351] [HARD] "><
Produce an algorithm that detects if a noise signal has been added to ares of the image with high gradient.

<>" PROG CHALLENGE [352] [IMPOSSIBLE] "><
Produce an algorithm that detects if a noise signal has been to a raw audio recording where the noise signal's amplitude is less than the white noise present in the recording.

Name: Anonymous 2012-11-03 15:54

>>151
Not >>148-149-kun; how are you going to measure the white noise present in an audio recording?

Name: Anonymous 2012-11-03 16:00

>>152
PROG CHALLENGE [352] [IMPOSSIBLE]
Evidently quite easily.

Name: Anonymous 2012-11-03 16:20

>>152
You know, the sound you hear when there are no other sounds. It serves as a random signal with low amplitude. Noise plus noise is more noise. Although adding two noisy signals will increase the amplitude.

>>153
Ok, then it should be easy for you to do it.

Name: 153 2012-11-03 16:21

>>154
You mistake me for FV; I am not FV.

Name: Anonymous 2012-11-03 16:24

>>155
sorry

Name: Anonymous 2012-11-03 16:27

This whole white noise thing might be more interesting if modern audio formats didn't explicitly remove noise. If you have both software that hides data in white noise and files that contain it, your imaginary prosecutors are just going to laugh at you.

Name: Anonymous 2012-11-03 16:30

>>157
if modern audio formats didn't explicitly remove noise
FLAC.

Name: Anonymous 2012-11-03 16:30

>>157
Just hide the software in the white noise. Duh.

Name: Anonymous 2012-11-03 16:33

>>157
True.

>>158
Seems too obscure. But if you are a musician that makes recordings, it makes sense to use a lossless encoding for the original.

Name: Anonymous 2012-11-03 16:38

>>160
Seems too obscure. But if you are a musician that makes recordings, it makes sense to use a lossless encoding for the original.
Exactly.  Just record yourself playing whatever musical instrument as a raw file.

Name: Anonymous 2012-11-03 16:40

>>160
FLAC? Obscure? How old are you? Have you reached triple digits yet?

Name: Anonymous 2012-11-03 16:43

>>162
To the average person that doesn't know the difference between wav and mp3, I think flac would be obscure. Why is my age relevant and why would it mater if my age is greater than or equal to 100 (assuming you are referring to the base 10 representation of my age)?

Name: Anonymous 2012-11-03 18:25

The age and permissions of UNIX beards are expressed in octal numbers.

Name: Anonymous 2012-11-03 18:26

>>163
kike

Name: Anonymous 2012-11-03 18:31

>>165
Imbecilic illogical racist shithead.  Tsk.

Name: Anonymous 2012-11-03 22:46

>>166
African-Jewish nigger.

Name: Anonymous 2012-11-04 1:53

So, does anyone have links to steganalysis tools?

Name: Anonymous 2012-11-04 1:10

It's sad how a perfectly good crypto thread got derailed by stego kiddies.
Let's talk about SHA3 instead. Should Skein have won?

Name: Anonymous 2012-11-04 1:30

>>169
It's sad how a perfectly good crypto thread got derailed by stego kiddies.
Eat shit and die, retard.

Name: Anonymous 2012-11-04 4:15

Fun fact: any cryptographic hash can be turned into a symmetric cipher.

Name: Anonymous 2012-11-04 5:01

>>171
any symmetric cipher can be turned into a cryptographic hash function

Name: Anonymous 2012-11-04 16:00

Fun fact: There are currently no usable asymmetric ciphers based on problems whose intractability has been formally proven (e.g. any NP-hard or -complete problem).

Name: Anonymous 2012-11-04 16:40

>>173
NTRUEncrypt is based on the lattice problem, and the McEliece cryptosystem on decoding linear codes. Both problems are known to be NP-hard. McEliece is kind of broken as it stands, but NTRU is fine (if patent-encumbered in the US).

But the fact that integer factorization and the discrete log problem aren't NP-hard doesn't mean they're tractable.

Name: Anonymous 2012-11-05 1:04

My dick is NP-hard, maybe we should use that?

Name: Anonymous 2012-11-05 5:54

Cretins, all of you.
Die in a fire.
My essential rights to use free, non-cluttered by binary blobs software shall not be curtained.

Name: Anonymous 2012-11-05 5:56

>>176
FUCK OFF AND EDfdsdsa lkjfds alkfhfdslkhlkhlkjdsah  I FUCKING HATE YOU FEMINAZI FAGSHIT I FUCK HATE YOU

Name: Anonymous 2012-11-05 5:57

>>176
DIE IN A FIRE YOU IDIOTIC NAZI CRETIN. GO SUCK AHMED'S AUTHORITARIAN DICK.

Name: Anonymous 2012-11-05 6:01

>>178
People of Iraq were invaded murdered humiliated robbed and now live without clean water medicine while watching Jewish pigs occupying their land and robbing the only thing that could make them a real country, this is just so criminal so sick corrupting imoral i cant believe, i would blow myself too if Jews did this to my country who cares if they call anyone terrorist their media is a lie.

Name: Anonymous 2012-11-05 6:02

>>179
It is unlikely that you have the flexibility required to effectively blow yourself.

Name: Anonymous 2012-11-05 6:03

>>179
If Iraqis (Arabs, shias, sunnis, Kurds, and Turkmens) had been united, they would have easily defeated terrorist American Jews with little effort.

Name: Anonymous 2012-11-05 6:06

>>181
Iraqis got what they deserved, they're stupid, tracherous and lazy people. You leaders reflects your society. Iraq traitors who plotted to overthrow Saddam, I hope your proud what sewer your country has become. Iraqis deserve no respect.

Name: Anonymous 2012-11-05 6:11

Israel hopes to colonize parts of Iraq as “Greater Israel”

Israeli expansionists, their intentions to take full control of the West Bank and the Gaza Strip and permanently keep the Golan Heights of Syria and expand into southern Lebanon already well known, also have their eyes on parts of Iraq considered part of a biblical “Greater Israel”.

Israel reportedly has plans to relocate thousands of Kurdish Jews from Israel, including expatriates from Kurdish Iran, to the Iraqi cities of Mosul and Nineveh under the guise of religious pilgrimages to ancient Jewish religious shrines. According to Kurdish sources, the Israelis are secretly working with the Kurdistan Regional Government (KRG) to carry out the integration of Kurdish and other Jews into areas of Iraq under control of the KRG.

Kurdish, Iraqi Sunni Muslims, and Turkmen have noted that Kurdish Israelis began to buy land in Iraqi Kurdistan, after the U.S. invasion in 2003, that is considered historical Jewish “property”.

Name: Anonymous 2012-11-05 6:11

>>183
The Israelis are particularly interested in the shrine of the Jewish prophet Nahum in al Qush, the prophet Jonah in Mosul, and the tomb of the prophet Daniel in Kirkuk. Israelis are also trying to claim Jewish “properties” outside of the Kurdish region, including the shrine of Ezekiel in the village of al-Kifl in Babel Province near Najaf and the tomb of Ezra in al-Uzayr in Misan Province, near Basra, both in southern Iraq’s Shia-dominated territory. Israeli expansionists consider these shrines and tombs as much a part of “Greater Israel” as Jerusalem and the West Bank, which they call “Judea and Samaria”.

Name: Anonymous 2012-11-05 6:27

Cultural artifacts are a sensitive issue in Iraq. Following the U.S. invasion of the country in 2003, when looting and chaos broke out in the country, museums were robbed and thousands of items chronicling some 7,000 years of civilization in Mesopotamia were taken.

Name: Anonymous 2012-12-04 0:27

>>176-185
Why did you kill this thread?

Name: Anonymous 2012-12-04 1:07

Dude, this is totally not egin.

Name: Anonymous 2012-12-04 1:11

quit eggin them on
check em

Name: Anonymous 2012-12-04 1:33

>>188
egg my doubles?

Name: Anonymous 2012-12-04 17:47

I want to be an expert cryptographer
What's an Abelson great book to read?
I can program in C and make loud farts.
Thank you, /prog/

Name: Anonymous 2012-12-05 0:55

>>190
Applied Cryptography. There's two books by the same name, one by The Bruce Schneider, and one by whogivesashit. Read both.

Name: Anonymous 2012-12-05 2:35

>>110
wait what? crypto hides data using advanced college-level math, stego hides the existence of data. how are they unrelated?

Name: Anonymous 2012-12-05 11:13

>>191

But it's from 1996. Hasn't cryptography developed a lot since then?

Name: Anonymous 2012-12-05 12:21

>>193
No.

Name: Anonymous 2012-12-05 12:37

>>193

Triple DES — 1998
WEP — 1999
Yarrow algorithm — 1999
AES — 2001
SHA-2 — 2001
Diffie–Hellman key exchange — 2002
WPA/WPA2 — 2003/2004

etc.

Name: Anonymous 2012-12-05 21:04

>>191
Schneider

Name: Anonymous 2012-12-05 23:06

>>195
Interesting, the birth of AES corresponds with the end of the debate on cryptographic regulation in most non fucktarded countries.

Name: Anonymous 2012-12-06 0:02

steganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptosteganocryptography

Name: Anonymous 2012-12-06 0:13

>>47
for decryption, one would have to try every steg encoding scheme against every private key in storage.
That was Ruby as Fuck!

Name: Anonymous 2012-12-06 1:31

>LeeEEEEEEEEEEEeeeeeeEEELLLLLLLLLLLLLLLLLLLLLLLLllll
>le egin

Name: Anonymous 2012-12-06 1:40

>>200
do you have teh downz??

Name: Anonymous 2012-12-06 2:05

Interesting. DH *can* actually asymmetrically encrypt short messages directly.

Alice's public key is (ga mod p, g, p), private key is a.

Bob wants to send message 0 < m < p. He picks a random b and sends Alice (m(ga)b mod p, gb mod p).

Alice then computes m(ga)b (gb)-a = mgab g-ab = m.

let's see how long it takes before someone writes a 2 line perl version of this

Name: Anonymous 2012-12-06 2:21

>>202
Congrats, you just invented ElGamal encryption.
http://en.wikipedia.org/wiki/ElGamal_encryption

Name: Anonymous 2012-12-06 3:12

Le Gargamel Encryption

Name: Anonymous 2012-12-06 6:45

Name: Anonymous 2012-12-06 7:06

According to Antoine Buéno, Gargamel is created as an archetypal Jew[4], with a big nose, magic powers, love of gold, and balding looks, Gargamel carries a lot of symbolism.
Terrible!

Name: Anonymous 2012-12-06 13:30

>>203
( ≖‿≖)

Name: Anonymous 2012-12-06 13:31

>>207
>EGIN MEME FACE, GRO!

Name: Anonymous 2012-12-07 15:00

Name: Anonymous 2012-12-07 15:03

>>208
Would you mind repeating that in English?

Name: >>208 2012-12-07 16:50

>>210
"I am a fucking faggot"

Name: Anonymous 2012-12-07 17:56

>>210
>LURK MOAR SUMMERFAG
>>211
>LELLLLL, EGIN!

Name: Anonymous 2012-12-14 1:44

ElGamal looked so simple, I figured I could fit its entire textual description into the size of a MSN icon.

data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAGAAAABgCAIAAABt+uBvAAAFTUlEQVR42u2d4Y6cMAyEef+Xpj+uOiGIx984TnZbEVWIcmASx/HYk5A9DljO8++/n/Pnn37PryfRdS3/KfNX2q0Ow+vp+U2+V87L8dYAeJ42JlJQJEdcH945rB6pSdT28X3DHraUInqeyB8q6GYCkXXUFGRox7Ug9zhvQWLYLrcg4oMiH0GOw/EfDclIPlGQtuKiD3rLyDj+lt//flv1rOuuwFzO9Y6f86eyrtev2gxfEODorTNu14d1GNYtukfUefgUknmttDgnlQsdKutV3QFR3YgSn89GMlEV097YYEHEIlJFw2My9J4+6Hn+tKYc9ap+gSgo6nBhNaKDtXG8hYc5u9AnRcx25JoTFTjUyF9EjSSOXNwD5QyVmyKgHsXNFhRBMkEZ7dc04vBnUwhKAAu6VdjIQhBA4pFyjEbeuM+CXJQRKDl89oksEdqmLZ8bYm/Zg1AzSFS4vskQCLIIaCCmq0dlIecqoGFdmxEiRHmQ9jupFiKkS5FRoyFPNXZYUOSJYcDCY5l5NOyxoKjHhjGIto7oXOd68FkRaqTZ/4scXwxYq/OmzzKQSZR5RgQ7eDFHQ5jfEXAgcaM3nDWKjRUEGB/iX9KUgrCaEZ8FUTJ35DY0AgsqxFMWEpHYh6NkahBKaGhBVd5nZohFiXQZJdtCgbc0gE4jp/upZ3OhcGxbkHHEBDscepa/W0JxkLxGNDJFDTcpdetgpUcNFsSzao4g1mwqjHd0Ir1cQXyIESbA8lnlubBVCnpLM/pA6nc18G1lFPVQIqSUG7mms+Mw53KjdnuWNFrtQDgjPc9NVlOk/gXOfBihibvCDM4rkS4iKUJ63c0TKwoqW5BGCs7mccp1BqEICzoeYl/AW/1fKDaTyLrpwgwkdcU19rMWHeGuvtD+xSWx0mHIk0HtLlC6kPKShM2rIWNKaFlLNbQjzxVd6G3igGuM2k0azNfSjJ8AyBl/CGAPMWFQZYRyV3dYCkoHxDuDtp5abNHu6pUh/SYA1wG2hPN6LpsgFKlDs45IPqXzLBKwptBu8UEaJfsVVM59NDSm7yqsrico2fxhjs6zyJpAK2O2kt6jb5XIW/5pBIy+Ka0iXQFqe6Z9jomVFWi4gW9HCdKd/vT3MbkEL82PDvYdlsdydixkgDHKEgXN5EREFwWkc7nwnlG2YmVFbkE+0gku3IokXnT7BKO4U+sFdnHtV9vn3Iox4si5fE7s88h+di8BkjQKRWimcWaViNZOui7x5gPXKkj0G2cFuQWlijAI08GuFrtIe8L+iQan7KJrQbH8OQW9pRlBPsVGdr3Le3ZmzmgFG8kRpzaxUfiyoD5ntIKNhIhjfR1AEPbQnyKQMH8fG5k51ILM4Wigu7+kESqB/zY28k4fnb0W5D77limk8FjBaCu4LiQyiclWLSRUH2YF/e3vKJrUttfrUZDYTNNlBfUGdzN+RNBKCzavcS0Is4Jko8QyElnylyiI+qDgYTKp0W5BEPXe8mlG8Wif0v3uvNKmO1LGb4ZR1JnB8O0z37j1E2YH2BFvhlGE6UvbPN0iRpHsEGUxihu+gN43xMheiy6juPML6LfsS7ryW0hOhPIy8DDKv8iO8vW2m5kUz4mmsjw3/3J3Pzf0+Ogusuk3WYuA8qbsZTT/0jtEiH3vXQXBzqgpaJzBHOmKISwHNttT0COZShtPFmugvMz0QTNy7Iq+ZS3o6Z+xKIDGjMy1vIeYfikciWOZ/xmO658JKJE2tjGN2gcN0el2f03mXc7Fb0by3Tb2WBAEjfT3UgoyIZO5z4IEDmiki35cpcQ65pUrz3a8qz5myx+YO3SzygU+hgAAAABJRU5ErkJggg==

Name: Anonymous 2012-12-14 2:20

>>213
Why aren't you using NTRU instead?

Name: Anonymous 2012-12-14 2:24

>>214
It's ugly, patent-encumbered and GPG doesn't support it.

Name: Anonymous 2012-12-14 2:30

>>214
There's something about CVP/SVP and LLL I never understood though. What is the run-time complexity of the LLL algorithm when searching for short vector in a lattice formed by n basis vectors of d integer components such that the short vector has all components smaller than a constant c?

Name: Anonymous 2012-12-14 2:44

ugly
And ElGamal isn't?

patent-encumbered
Why are you worried about censorship if you can encrypt your shit?

GPG doesn't support it.
That's to be expected from GNU shit.

Name: massive faggot 2012-12-14 3:15

>>216
O(42)

Name: Anonymous 2012-12-14 3:21

>>217
ElGamal has a very short textual description.

Name: Anonymous 2012-12-14 7:21

>>219
Your mom said the same thing last night.

oh wait

Name: Anonymous 2012-12-14 12:35

>>219
https://en.wikipedia.org/wiki/NTRUEncrypt:
Operations are based on objects in a truncated [[polynomial ring]] <math> \ R=Z[X]/(X^N-1) </math> with convolution multiplication and all polynomials in the ring have [[integer]] [[coefficient]]s and degree at most ''N''-1:

:<math>  \textbf{a} = a_0 + a_1 X + a_2 X^2 + \cdots + a_{N-2} X^{N-2} + a_{N-1} X^{N-1} </math>

NTRU is actually a parameterised family of cryptosystems; each system is specified by three integer parameters (''N'', ''p'', ''q'') which represent the maximal degree <math> \ N-1 </math> for all polynomials in the truncated ring ''R'', a small modulus and a large modulus, respectively, where it is assumed that ''N'' is [[prime number|prime]], ''q'' is always larger than ''p'', and ''p'' and ''q'' are [[coprime]]; and four sets of polynomials <math> \ \mathcal{L}_f, \mathcal{L}_g, \mathcal{L}_m </math> and <math> \ \mathcal{L}_r </math> (a polynomial part of the private key, a polynomial for generation of the public key, the message and a blinding value, respectively), all of degree at most <math> \ N-1 </math>.

Name: Anonymous 2012-12-14 19:39

>>221
That still doesn't tell me how to make a key, encrypt, or decrypt.

Name: Anonymous 2012-12-14 20:47

>>222
It tells you 99% of what you need to do. For the other 1%, see the rest of the Wikipedia article.

Name: Anonymous 2012-12-14 20:58

why should i believe in the security of cryptosystems based on the jewish math pseudoscience?

Name: Anonymous 2012-12-14 21:10

>>224
Wash your balls, Ahmed.

Name: Anonymous 2012-12-14 21:14

>>223
0/10

Name: Anonymous 2012-12-14 21:23

>>224
Egyptians used math long before Jews even existed, let alone showed up to learn math from the Egyptians and then claim it as their own invention.

Name: Anonymous 2012-12-15 4:25

Egyptians used jews long before math even existed.

Name: Anonymous 2012-12-17 15:22

>>3
How could you possibly know it was from there? Go back there with him, now.

Name: Anonymous 2012-12-17 17:11

>>13
What's wrong with vim? I agree on Firefox and especially XML, though.

Name: Anonymous 2012-12-17 18:14

>>230
Anti-free license, nag screen, no open mode, lots of minor bugs.

Name: Anonymous 2012-12-17 18:30

>>231
Anti-free license
It's compatible with the GPL, doesn't that pass the litmus test?
nag screen
Can be turned off.
no open mode
Sure.
lots of minor bugs.
Which ones in particular are you referring to?

Name: Anonymous 2012-12-17 20:32

>>232
GPL is for faggots and /r/helping_niglets_of_uganda is that way ->

Name: Anonymous 2012-12-17 20:34

>>231
no open mode
You mean vim /etc or did I misunderstand you?

Name: Anonymous 2012-12-17 20:34

>>233
(´_ゝ`)

Name: Anonymous 2012-12-17 20:38

>>234
You don't know vi, do you?

Name: Anonymous 2012-12-17 20:50

>>232
GPL is anti-free fascist shit.
I shouldn't have to put some obscure text in some obscure file to turn off adware in a text editor.
As for which bugs, the Vim developers maintain a nice list of them in their manual.

Name: Anonymous 2012-12-17 21:07

>>237
And Stallman is a filthy Jew.

Name: Anonymous 2012-12-17 21:16

>>238
And you are a racist cretin. We done here?

Name: Anonymous 2012-12-17 21:20

>>239
Shalom, Hymie!

Name: Anonymous 2012-12-17 21:24

>>236
Actually, I don't. Sorry.

Don't change these.
Name: Email:
Entire Thread Thread List