Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

You feel a whole lot more like you do now than you did when you used to.


talk / talk.politics.guns / Re: Trump assassin linked to far-right social media posts

SubjectAuthor
* Trump assassin linked to far-right social media postsNadegda
+* Re: Trump assassin linked to far-right social media postsSkeeter
|+* Re: Trump assassin linked to far-right social media postsX, formerly known as \"!Jones\"
||`* Re: Trump assassin linked to far-right social media posts%
|| `- Re: Trump assassin linked to far-right social media postsAnonymous
|`* Re: Trump assassin linked to far-right social media postsJay Santos
| `- Re: Trump assassin linked to far-right social media postsZersterer
+* Re: Trump assassin linked to far-right social media posts%
|+* Re: Trump assassin linked to far-right social media postsZersterer
||`- Re: Trump assassin linked to far-right social media posts%
|+- Re: Trump assassin linked to far-right social media postsChips Loral
|`* Reading 849-34 (archive)JTEM
| +* Re: Reading 849-34 (archive)Michael H.
| |`* Re: Reading 849-34 (archive)JTEM
| | `* Re: Reading 849-34 (archive)Casa
| |  `- Re: Reading 849-34 (archive)JTEM
| `* Re: Reading 849-34 (archive)kensi
|  `* Re: Reading 849-34 (archive)JTEM
|   `* Re: Reading 849-34 (archive)Nadegda
|    +* Re: Reading 849-34 (archive)Sn!pe
|    |`- Re: Reading 849-34 (archive)Brandon
|    +* Re: Reading 849-34 (archive)JTEM
|    |`* Re: Reading 849-34 (archive)Nadegda
|    | +- Reading 925-1 (archive)JTEM
|    | +- Re: Reading 849-34 (archive)Anonymous
|    | +- Re: Reading 849-34 (archive)Skeeter
|    | `* Re: Reading 849-34 (archive)Nadegda
|    |  +* Re: Reading 849-34 (archive)William Stickers
|    |  |`- Re: Reading 849-34 (archive)Sn!pe
|    |  +- Re: Reading 849-34 (archive)%
|    |  +- Re: Reading 849-34 (archive)Skeeter
|    |  +* Re: Reading 849-34 (archive)Tard Wrangler
|    |  |`* Re: Reading 849-34 (archive)%
|    |  | `* Re: Reading 849-34 (archive)Tard Wrangler
|    |  |  `* Re: Reading 849-34 (archive)Nadegda
|    |  |   +- Re: Reading 849-34 (archive)%
|    |  |   +- Re: Reading 849-34 (archive)Tard Wrangler
|    |  |   `* Re: Reading 849-34 (archive)kensi
|    |  |    +- Re: Reading 849-34 (archive)Texas Joe
|    |  |    +- Re: Reading 849-34 (archive)<Use-Author-Supplied-Address-Header
|    |  |    `* Re: Reading 849-34 (archive)Nadegda
|    |  |     +* Re: Reading 849-34 (archive)Tard Wrangler
|    |  |     |`- Re: Reading 849-34 (archive)Skeeter
|    |  |     `* Re: Reading 849-34 (archive)kensi
|    |  |      `* Re: Reading 849-34 (archive)Nadegda
|    |  |       +* Re: Reading 849-34 (archive)Tard Wrangler
|    |  |       |`- Re: Reading 849-34 (archive)Peter Steele
|    |  |       `* Re: Reading 849-34 (archive)kensi
|    |  |        `* Re: Reading 849-34 (archive)Nadegda
|    |  |         +- Re: Reading 849-34 (archive)Tard Wrangler
|    |  |         +- Re: Reading 849-34 (archive)Shoeless Joe's
|    |  |         +* Re: Great point by Sam Harris: we don't need term "atheist"Rudy Canoza
|    |  |         |`- Re: Great point by Sam Harris: we don't need term "atheist"Prince Albert
|    |  |         `* Re: Reading 849-34 (archive)Nadegda
|    |  |          +- Re: LA Democrat queers failed to have enough water to fight firesMichael A Terrell
|    |  |          +* Re: LA Democrat queers failed to have enough water to fight firesMichael A Terrell
|    |  |          |+- Re: LA Democrat queers failed to have enough water to fight firesMichael A Terrell
|    |  |          |`- Re: LA Democrat queers failed to have enough water to fight firesMAGA 2025
|    |  |          +* Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresMichael A Terrell
|    |  |          |`- Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresMichael A Terrell
|    |  |          +- Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresRudy Canoza
|    |  |          +- Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresBaxter
|    |  |          +- Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresBaxter
|    |  |          +* Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresMichael A Terrell
|    |  |          |+- Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresJ Carlson
|    |  |          |`* Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresMichael A Terrell
|    |  |          | `* Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresMichael A Terrell
|    |  |          |  `- Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresMichael A Terrell
|    |  |          +- Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresMichael A Terrell
|    |  |          +- Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresMichael A Terrell
|    |  |          +- Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresMichael A Terrell
|    |  |          +* Subject:Re: Reading 849-34 (archive)Nadegda
|    |  |          |`- Re: Subject:Re: Reading 849-34 (archive)%
|    |  |          +* Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresMichael A Terrell
|    |  |          |`* Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresMichael A Terrell
|    |  |          | `- Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresMichael A Terrell
|    |  |          `- Re: LA Democrat Queers Failed To Have Enough Water To Fight FiresMichael A Terrell
|    |  `* Re: Reading 849-34 (archive)JTEM
|    |   `* Re: Reading 849-34 (archive)Nadegda
|    |    +* Re: Reading 849-34 (archive)%
|    |    |`* Re: Reading 849-34 (archive)Skeeter
|    |    | `- Re: Reading 849-34 (archive)%
|    |    `* Re: Reading 849-34 (archive)Tard Wrangler
|    |     `* Re: Reading 849-34 (archive)Nadegda
|    |      +- Re: Reading 849-34 (archive)Tard Wrangler
|    |      `* Re: Reading 849-34 (archive)kensi
|    |       `* Re: Reading 849-34 (archive)Nadegda
|    |        +* Re: Reading 849-34 (archive)%
|    |        |`- Re: Reading 849-34 (archive)Sn!pe
|    |        +- Re: Reading 849-34 (archive)Tard Wrangler
|    |        `* Re: Reading 849-34 (archive)kensi
|    |         `* Re: Reading 849-34 (archive)Nadegda
|    |          `* Re: Reading 849-34 (archive)Tard Wrangler
|    |           `* Re: Reading 849-34 (archive)Nadegda
|    |            `* Re: Reading 849-34 (archive)Tard Wrangler
|    |             `* Re: Reading 849-34 (archive)Nadegda
|    |              +- Re: Reading 849-34 (archive)%
|    |              `- Re: Reading 849-34 (archive)Tard Wrangler
|    +- Re: Reading 849-34 (archive)Tard Wrangler
|    `* Re: Reading 849-34 (archive)Skeeter
|     `* Re: Reading 849-34 (archive)%
+* Re: Trump assassin linked to far-right social media postsX, formerly known as \"!Jones\"
+- Re: Klown ScheiΓƒΒŸefreude has a plan to assassinate an ex presidentKlaus Schadenfreude
`- Re: ðŸ?Β³Γ―ΒΈ?Γ’Β€?🌈Trump assassin linked to far-right social media postsðŸ?Β³Γ―ΒΈ?Γ’Β€Klaus Schadenfreude

Pages:1234567
Subject: Re: Trump assassin linked to far-right social media posts
From: %
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Date: Thu, 1 Aug 2024 22:43 UTC
References: 1 2 3 4 5 6 7
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!border-3.nntp.ord.giganews.com!nntp.giganews.com!Xl.tags.giganews.com!local-4.nntp.ord.giganews.com!news.giganews.com.POSTED!not-for-mail
NNTP-Posting-Date: Thu, 01 Aug 2024 22:43:56 +0000
Subject: Re: Trump assassin linked to far-right social media posts
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
References: <v8bqbo$17n0k$1@dont-email.me>
<mt6jajtdgpjvrlqm1ifden2i6ue47843iv@4ax.com>
<SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com>
<pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me>
<66abe7ee$0$1427989$882e4bbb@reader.netnews.com>
<66ac0d94$0$3068682$882e4bbb@reader.netnews.com>
From: pursent100@gmail.com (%)
Date: Thu, 1 Aug 2024 15:43:55 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:91.0) Gecko/20100101
Firefox/91.0 SeaMonkey/2.53.18.2
MIME-Version: 1.0
In-Reply-To: <66ac0d94$0$3068682$882e4bbb@reader.netnews.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Antivirus: AVG (VPS 240801-6, 2024-8-1), Outbound message
X-Antivirus-Status: Clean
Message-ID: <SvacnSLy6KIxkjH7nZ2dnZfqnPGdnZ2d@giganews.com>
Lines: 42
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-XeCtusHoHgLEZKDrrszcogWD2kiATONRR9pMAAQTCI12ufMvHlyHq+Oq1o3c+JXkTRPSl3waUEO0yZj!6X4NXEcDsRneLMHEi29/q9ktLwv5leMAwf+4ORyBtqic1hKUSQxRBZHg7q2AEUkSYSdc52anAl+p
X-Complaints-To: abuse@giganews.com
X-DMCA-Notifications: http://www.giganews.com/info/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
View all headers

automatic tranny wrote:
>
> On Thu, 1 Aug 2024 13:54:32 -0600, Skeeter said:
>
>
>
>
>>
>> In article <v8dob6$1lrot$3@dont-email.me>, loralandclinton@invalid.co
>> says...
>>>
>>> X, formerly known as "!Jones" wrote:
>>>> The point being that we see an average of two
>>>> mass shootings per day in the US. The only thing special about this
>>>> one was that the Donald was present and happened to get his ear
>>>> nicked.
>>>
>>>
>>> https://www.thedailybeast.com/fbi-thomas-matthew-crooks-may-have-hid-antisemitic-anti-immigrant-social-page
>>>
>>> The FBI is investigating a social media account that may have belonged
>>> to Crooks with over 700 antisemitic and anti-immigrant posts.
>>>
>>> ?There were over 700 comments posted from this account,? said Abbate.
>>> ?Some of these comments, if ultimately attributable to the shooter,
>>> appear to reflect antisemitic and anti-immigration themes to espouse
>>> political violence and are described as extreme in nature.?
>>>
>>> https://www.telegraph.co.uk/us/politics/2024/07/18/trump-shooter-researched-royal-family-while-planning-attack/
>>>
>>> Trump shooter researched Royal family while planning attack
>>> Thomas Crooks searched online for various high-profile figures as he
>>> ?scoped out? targets for assassination, FBI says
>>
>> 3 encrypted cash accounts over seas also that somehow our brilliant FBI
>> can't crack.
>
> ask a biden
>
hey joe who did you blow ,
moe pushed the button boy and you went to the show ,
better suck a little harder or the sheckles won't flow

Subject: Re: Trump assassin linked to far-right social media posts
From: %
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Date: Thu, 1 Aug 2024 22:46 UTC
References: 1 2 3 4 5 6 7 8 9 10
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!border-4.nntp.ord.giganews.com!nntp.giganews.com!Xl.tags.giganews.com!local-4.nntp.ord.giganews.com!news.giganews.com.POSTED!not-for-mail
NNTP-Posting-Date: Thu, 01 Aug 2024 22:46:56 +0000
Subject: Re: Trump assassin linked to far-right social media posts
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
References: <v8bqbo$17n0k$1@dont-email.me>
<mt6jajtdgpjvrlqm1ifden2i6ue47843iv@4ax.com>
<SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com>
<pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me>
<66abe7ee$0$1427989$882e4bbb@reader.netnews.com>
<g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com>
<66ac0a03$0$1427653$882e4bbb@reader.netnews.com>
<SvacnSDy6KLqkzH7nZ2dnZfqnPGdnZ2d@giganews.com>
<66ac0fd9$0$3068693$882e4bbb@reader.netnews.com>
From: pursent100@gmail.com (%)
Date: Thu, 1 Aug 2024 15:46:56 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:91.0) Gecko/20100101
Firefox/91.0 SeaMonkey/2.53.18.2
MIME-Version: 1.0
In-Reply-To: <66ac0fd9$0$3068693$882e4bbb@reader.netnews.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Antivirus: AVG (VPS 240801-6, 2024-8-1), Outbound message
X-Antivirus-Status: Clean
Message-ID: <SvacnVzy6KL8jTH7nZ2dnZfqnPGdnZ2d@giganews.com>
Lines: 54
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-A5IdmLpmvcSZDM/bR4Ok5OlzekNUkxNu2nRwoqYxmhsKBxtE8yWXWWMUDhOcXPaE4yTt4xki2HA17Sr!upbW9zreoQWrX4LxNzv07Mqs7kPbXeBOKthN3zBz1YKWJP6H4OZMwSVdJqDhHueNzfq6dMFCJ3Lo
X-Complaints-To: abuse@giganews.com
X-DMCA-Notifications: http://www.giganews.com/info/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
View all headers

automatic tranny wrote:
>
> On Thu, 1 Aug 2024 15:38:46 -0700, % said:
>
>
>
>
>>
>> Skeeter wrote:
>>> In article <g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com>, x@y.com says...
>>>>
>>>> If you have a medical emergency, stop reading, log off, and dial 911!
>>>>
>>>>> In article <v8dob6$1lrot$3@dont-email.me>, loralandclinton@invalid.co
>>>>> says...
>>>>>>
>>>>>> X, formerly known as "!Jones" wrote:
>>>>>>> The point being that we see an average of two
>>>>>>> mass shootings per day in the US. The only thing special about this
>>>>>>> one was that the Donald was present and happened to get his ear
>>>>>>> nicked.
>>>>>>
>>>>>>
>>>>>> https://www.thedailybeast.com/fbi-thomas-matthew-crooks-may-have-hid-antisemitic-anti-immigrant-social-page
>>>>>>
>>>>>> The FBI is investigating a social media account that may have belonged
>>>>>> to Crooks with over 700 antisemitic and anti-immigrant posts.
>>>>>>
>>>>>> ?There were over 700 comments posted from this account,? said Abbate.
>>>>>> ?Some of these comments, if ultimately attributable to the shooter,
>>>>>> appear to reflect antisemitic and anti-immigration themes to espouse
>>>>>> political violence and are described as extreme in nature.?
>>>>>>
>>>>>> https://www.telegraph.co.uk/us/politics/2024/07/18/trump-shooter-researched-royal-family-while-planning-attack/
>>>>>>
>>>>>> Trump shooter researched Royal family while planning attack
>>>>>> Thomas Crooks searched online for various high-profile figures as he
>>>>>> ?scoped out? targets for assassination, FBI says
>>>>>
>>>>> 3 encrypted cash accounts over seas also that somehow our brilliant FBI
>>>>> can't crack.
>>>>
>>>> If all I need to do is to encrypt something such that you can't get
>>>> it, that's easy. I seed a random generator and XOR it. It's not
>>>> crackable. The seed is the key. The problem happens when I need to
>>>> send you the key.
>>>
>>> I believe they can crack it. I also wonder where they came from.
>>>
>> i already figured it out
>
> by cracky
>
i slipped in

Subject: Re: Trump assassin linked to far-right social media posts
From: Anonymous
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Organization: Mixmin
Date: Fri, 2 Aug 2024 01:48 UTC
References: 1 2 3 4 5
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.mixmin.net!.POSTED!not-for-mail
From: anon@anon.net (Anonymous)
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: Trump assassin linked to far-right social media posts
Date: Thu, 1 Aug 2024 21:48:13 -0400
Organization: Mixmin
Message-ID: <v8hdsu$fp52$2@news.mixmin.net>
References: <v8bqbo$17n0k$1@dont-email.me>
<66a96ff3$0$1895495$882e4bbb@reader.netnews.com>
<ta7jajhsipbah00ch5u9aoieic7bogjts7@4ax.com>
<_pednX_Nzq5yPDT7nZ2dnZfqn_WdnZ2d@giganews.com>
<igmkajpk7bi6195rb4su2j6b1ofo935fcb@4ax.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 2 Aug 2024 01:48:14 -0000 (UTC)
Injection-Info: news.mixmin.net; posting-host="c4af4a3027e8317d29ea238d8aa6bb2f616aa3fc";
logging-data="517282"; mail-complaints-to="abuse@mixmin.net"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <igmkajpk7bi6195rb4su2j6b1ofo935fcb@4ax.com>
View all headers

X, formerly known as "!Jones" wrote:
> If you have a medical emergency, stop reading, log off, and dial 911!
>
>> never deal with the devil you don't know ,
>> when you can deal with the devil you got
>
> In the US political system, it's: "Between the devil you know and the
> one you don't, choose the devil you haven't been with lately."
>
> The Biden/Harris administration has been reasonably successful;

No it hasn't.

> whereas, the previous Trump administration was characterized as: "a
> dumpster fire in a train wreck." "Reasonably successful" doesn't mean
> stellar, but he hasn't sent a mob to the capitol, either... yet.
> Actually, things are going reasonably well... everything under Biden's
> control is, anyway. There are many things that people *think* are
> controlled by the president that are, in fact, legislatively centered:
> the budget & inflation, border security, the crime rate... I could go
> on and on.
>
> The president can't issue a directive that secures the border;

Yes he can.

Subject: Re: Trump assassin linked to far-right social media posts
From: X, formerly known as
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Organization: A noiseless patient Spider
Date: Fri, 2 Aug 2024 02:00 UTC
References: 1 2 3 4 5 6 7 8
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: x@y.com (X, formerly known as \"!Jones\")
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: Trump assassin linked to far-right social media posts
Date: Thu, 01 Aug 2024 21:00:45 -0500
Organization: A noiseless patient Spider
Lines: 7
Message-ID: <ccfoajtvga2c298o11lga5vj2hrb3h9gm7@4ax.com>
References: <v8bqbo$17n0k$1@dont-email.me> <mt6jajtdgpjvrlqm1ifden2i6ue47843iv@4ax.com> <SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com> <pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me> <66abe7ee$0$1427989$882e4bbb@reader.netnews.com> <g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com> <66ac0a03$0$1427653$882e4bbb@reader.netnews.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 02 Aug 2024 04:00:47 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="c28a33880feaa0d881107ab2ad514a2b";
logging-data="2742313"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+CTxm5Sjtu4SlI9+Yy6kuw"
Cancel-Lock: sha1:1hudTGrOxGFDui+ROnRnfS/iLpg=
X-Newsreader: Forte Agent 1.8/32.548
View all headers

If you have a medical emergency, stop reading, log off, and dial 911!

>I believe they can crack it. I also wonder where they came from.

It's known as a single use pad. It is uncrackable. (Just not real
useful in the world of cryptography.)

Subject: Re: Trump assassin linked to far-right social media posts
From: Creon
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Date: Sat, 3 Aug 2024 10:36 UTC
References: 1 2 3 4 5 6 7
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: creon@creon.earth (Creon)
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: Trump assassin linked to far-right social media posts
Date: 3 Aug 2024 10:36:05 GMT
Lines: 46
Message-ID: <lh6fglFsh0qU2@mid.individual.net>
References: <v8bqbo$17n0k$1@dont-email.me>
<mt6jajtdgpjvrlqm1ifden2i6ue47843iv@4ax.com>
<SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com>
<pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me>
<66abe7ee$0$1427989$882e4bbb@reader.netnews.com>
<g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Trace: individual.net /ddcT2dKcGYMp+F29nFLHQCweaHe0Kn1YtVFhGlLAm5XNwUKbr
Cancel-Lock: sha1:d3v1iQKTjJNA3FM/Y4zJg8Wlvi4= sha256:xGzevcc3akqT17hRgl5jYIB+6b6V8u7lhLXb9oPbs68=
X-Face: \}2`P"_@pS86<'EM:'b.Ml}8IuMK"pV"?FReF$'c.S%u9<Q#U*4QO)$l81M`{Q/n
XL'`91kd%N::LG:=*\35JS0prp\VJN^<s"b#bff@fA7]5lJA.jn,x_d%Md$,{.EZ
X-Tongue-In-Cheek: in the old-timey way, of course
User-Agent: Pan/0.159 (Vovchansk; 26ff567; Linux-6.11.0-rc1)
View all headers

On Thu, 01 Aug 2024 17:04:06 -0500, X, formerly known as \"!Jones\" wrote:

> If you have a medical emergency, stop reading, log off, and dial 911!
>
>>In article <v8dob6$1lrot$3@dont-email.me>, loralandclinton@invalid.co
>>says...
>>>
>>> X, formerly known as "!Jones" wrote:
>>> > The point being that we see an average of two
>>> > mass shootings per day in the US. The only thing special about this
>>> > one was that the Donald was present and happened to get his ear
>>> > nicked.
>>>
>>>
>>> https://www.thedailybeast.com/fbi-thomas-matthew-crooks-may-have-hid-
antisemitic-anti-immigrant-social-page
>>>
>>> The FBI is investigating a social media account that may have belonged
>>> to Crooks with over 700 antisemitic and anti-immigrant posts.
>>>
>>> ?There were over 700 comments posted from this account,? said Abbate.
>>> ?Some of these comments, if ultimately attributable to the shooter,
>>> appear to reflect antisemitic and anti-immigration themes to espouse
>>> political violence and are described as extreme in nature.?
>>>
>>> https://www.telegraph.co.uk/us/politics/2024/07/18/trump-shooter-
researched-royal-family-while-planning-attack/
>>>
>>> Trump shooter researched Royal family while planning attack Thomas
>>> Crooks searched online for various high-profile figures as he ?scoped
>>> out? targets for assassination, FBI says
>>
>>3 encrypted cash accounts over seas also that somehow our brilliant FBI
>>can't crack.
>
> If all I need to do is to encrypt something such that you can't get it,
> that's easy. I seed a random generator and XOR it. It's not crackable.
> The seed is the key. The problem happens when I need to send you the
> key.

Surprisingly savvy.

(As long as both ends are using the same PRNG.)

--
-c

Subject: Re: Trump assassin linked to far-right social media posts
From: Creon
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Date: Sat, 3 Aug 2024 10:44 UTC
References: 1 2 3 4 5 6 7 8
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: creon@creon.earth (Creon)
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: Trump assassin linked to far-right social media posts
Date: 3 Aug 2024 10:44:27 GMT
Lines: 54
Message-ID: <lh6g0bFsh0qU3@mid.individual.net>
References: <v8bqbo$17n0k$1@dont-email.me>
<mt6jajtdgpjvrlqm1ifden2i6ue47843iv@4ax.com>
<SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com>
<pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me>
<66abe7ee$0$1427989$882e4bbb@reader.netnews.com>
<g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com>
<lh6fglFsh0qU2@mid.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Trace: individual.net aaTYLa5WcfURVjNJB/EJ2gDM6XsX9f9NFx4TkRYIuBM67QUolc
Cancel-Lock: sha1:Gaynbe3bNbfZCVrnvQP0oeVgzds= sha256:yeEJvXpU/1L3tNee/LASo9ZZcNuGfgmQVMWlM5Tj9Hw=
X-Face: \}2`P"_@pS86<'EM:'b.Ml}8IuMK"pV"?FReF$'c.S%u9<Q#U*4QO)$l81M`{Q/n
XL'`91kd%N::LG:=*\35JS0prp\VJN^<s"b#bff@fA7]5lJA.jn,x_d%Md$,{.EZ
X-Tongue-In-Cheek: in the old-timey way, of course
User-Agent: Pan/0.159 (Vovchansk; 26ff567; Linux-6.11.0-rc1)
View all headers

On 3 Aug 2024 10:36:05 GMT, Creon wrote:

> On Thu, 01 Aug 2024 17:04:06 -0500, X, formerly known as \"!Jones\"
> wrote:
>
>> If you have a medical emergency, stop reading, log off, and dial 911!
>>
>>>In article <v8dob6$1lrot$3@dont-email.me>, loralandclinton@invalid.co
>>>says...
>>>>
>>>> X, formerly known as "!Jones" wrote:
>>>> > The point being that we see an average of two
>>>> > mass shootings per day in the US. The only thing special about
>>>> > this one was that the Donald was present and happened to get his
>>>> > ear nicked.
>>>>
>>>>
>>>> https://www.thedailybeast.com/fbi-thomas-matthew-crooks-may-have-hid-
> antisemitic-anti-immigrant-social-page
>>>>
>>>> The FBI is investigating a social media account that may have
>>>> belonged to Crooks with over 700 antisemitic and anti-immigrant
>>>> posts.
>>>>
>>>> ?There were over 700 comments posted from this account,? said Abbate.
>>>> ?Some of these comments, if ultimately attributable to the shooter,
>>>> appear to reflect antisemitic and anti-immigration themes to espouse
>>>> political violence and are described as extreme in nature.?
>>>>
>>>> https://www.telegraph.co.uk/us/politics/2024/07/18/trump-shooter-
> researched-royal-family-while-planning-attack/
>>>>
>>>> Trump shooter researched Royal family while planning attack Thomas
>>>> Crooks searched online for various high-profile figures as he ?scoped
>>>> out? targets for assassination, FBI says
>>>
>>>3 encrypted cash accounts over seas also that somehow our brilliant FBI
>>>can't crack.
>>
>> If all I need to do is to encrypt something such that you can't get it,
>> that's easy. I seed a random generator and XOR it. It's not
>> crackable.
>> The seed is the key. The problem happens when I need to send you the
>> key.
>
> Surprisingly savvy.
>
> (As long as both ends are using the same PRNG.)

I've wondered about this for a while. Just asked about
it in sci.crypt, we'll see what they say.

--
-c

Subject: Re: Trump assassin linked to far-right social media posts
From: X, formerly known as
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Organization: A noiseless patient Spider
Date: Sat, 3 Aug 2024 11:21 UTC
References: 1 2 3 4 5 6 7 8 9
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: x@y.com (X, formerly known as \"!Jones\")
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: Trump assassin linked to far-right social media posts
Date: Sat, 03 Aug 2024 06:21:23 -0500
Organization: A noiseless patient Spider
Lines: 9
Message-ID: <1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com>
References: <v8bqbo$17n0k$1@dont-email.me> <mt6jajtdgpjvrlqm1ifden2i6ue47843iv@4ax.com> <SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com> <pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me> <66abe7ee$0$1427989$882e4bbb@reader.netnews.com> <g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com> <lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 03 Aug 2024 13:21:25 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="8597087deac268a3b49a94e8e47598d8";
logging-data="3604434"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19Zw8a5dpeefwq+iKoqI9kX"
Cancel-Lock: sha1:UnbRx1szQUoecSfOYgGvGNtYrno=
X-Newsreader: Forte Agent 1.8/32.548
View all headers

If you have a medical emergency, stop reading, log off, and dial 911!

>I've wondered about this for a while. Just asked about
>it in sci.crypt, we'll see what they say.

I would expect the level of discussion regarding cryptography there to
mirror the deep thought into the politics of guns in
talk.politics.guns.

Subject: Re: Trump assassin linked to far-right social media posts
From: %
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Date: Sat, 3 Aug 2024 14:59 UTC
References: 1 2 3 4 5 6 7 8 9
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!border-3.nntp.ord.giganews.com!nntp.giganews.com!local-3.nntp.ord.giganews.com!Xl.tags.giganews.com!local-4.nntp.ord.giganews.com!news.giganews.com.POSTED!not-for-mail
NNTP-Posting-Date: Sat, 03 Aug 2024 14:59:39 +0000
Subject: Re: Trump assassin linked to far-right social media posts
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
References: <v8bqbo$17n0k$1@dont-email.me>
<mt6jajtdgpjvrlqm1ifden2i6ue47843iv@4ax.com>
<SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com>
<pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me>
<66abe7ee$0$1427989$882e4bbb@reader.netnews.com>
<g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com>
<lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net>
From: pursent100@gmail.com (%)
Date: Sat, 3 Aug 2024 07:59:39 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:91.0) Gecko/20100101
Firefox/91.0 SeaMonkey/2.53.18.2
MIME-Version: 1.0
In-Reply-To: <lh6g0bFsh0qU3@mid.individual.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Antivirus: AVG (VPS 240802-4, 2024-8-2), Outbound message
X-Antivirus-Status: Clean
Message-ID: <ZZicnV54xdhG2DP7nZ2dnZfqnPh3fwAA@giganews.com>
Lines: 55
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-Tqh7wESlclG42f+S/bB6iKAI6BTgi9JakZAZgk2wyUsKf+JoT36PQtthlAncOqjrY9o1foCgWiuSmmr!uJqDSmOmAgOkSw8x3SmfizYXzMT1GUqs78zx81WMA4/yOS4mTaTc98lWV81+DSm4vW3mj7+ukeP2
X-Complaints-To: abuse@giganews.com
X-DMCA-Notifications: http://www.giganews.com/info/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
View all headers

Creon wrote:
> On 3 Aug 2024 10:36:05 GMT, Creon wrote:
>
>> On Thu, 01 Aug 2024 17:04:06 -0500, X, formerly known as \"!Jones\"
>> wrote:
>>
>>> If you have a medical emergency, stop reading, log off, and dial 911!
>>>
>>>> In article <v8dob6$1lrot$3@dont-email.me>, loralandclinton@invalid.co
>>>> says...
>>>>>
>>>>> X, formerly known as "!Jones" wrote:
>>>>>> The point being that we see an average of two
>>>>>> mass shootings per day in the US. The only thing special about
>>>>>> this one was that the Donald was present and happened to get his
>>>>>> ear nicked.
>>>>>
>>>>>
>>>>> https://www.thedailybeast.com/fbi-thomas-matthew-crooks-may-have-hid-
>> antisemitic-anti-immigrant-social-page
>>>>>
>>>>> The FBI is investigating a social media account that may have
>>>>> belonged to Crooks with over 700 antisemitic and anti-immigrant
>>>>> posts.
>>>>>
>>>>> ?There were over 700 comments posted from this account,? said Abbate.
>>>>> ?Some of these comments, if ultimately attributable to the shooter,
>>>>> appear to reflect antisemitic and anti-immigration themes to espouse
>>>>> political violence and are described as extreme in nature.?
>>>>>
>>>>> https://www.telegraph.co.uk/us/politics/2024/07/18/trump-shooter-
>> researched-royal-family-while-planning-attack/
>>>>>
>>>>> Trump shooter researched Royal family while planning attack Thomas
>>>>> Crooks searched online for various high-profile figures as he ?scoped
>>>>> out? targets for assassination, FBI says
>>>>
>>>> 3 encrypted cash accounts over seas also that somehow our brilliant FBI
>>>> can't crack.
>>>
>>> If all I need to do is to encrypt something such that you can't get it,
>>> that's easy. I seed a random generator and XOR it. It's not
>>> crackable.
>>> The seed is the key. The problem happens when I need to send you the
>>> key.
>>
>> Surprisingly savvy.
>>
>> (As long as both ends are using the same PRNG.)
>
> I've wondered about this for a while. Just asked about
> it in sci.crypt, we'll see what they say.
>
oh look a new group to wreck ,
giving you full credit of course

Subject: PRNG Crypto (was: Re: Trump assassin linked to far-right social media posts)
From: Creon
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Date: Sun, 4 Aug 2024 09:41 UTC
References: 1 2 3 4 5 6 7 8 9 10
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: creon@creon.earth (Creon)
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: PRNG Crypto (was: Re: Trump assassin linked to far-right social media
posts)
Date: 4 Aug 2024 09:41:03 GMT
Lines: 17
Message-ID: <lh90lfF6q3tU5@mid.individual.net>
References: <v8bqbo$17n0k$1@dont-email.me>
<mt6jajtdgpjvrlqm1ifden2i6ue47843iv@4ax.com>
<SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com>
<pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me>
<66abe7ee$0$1427989$882e4bbb@reader.netnews.com>
<g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com>
<lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net>
<1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Trace: individual.net CVG97m90FO1VACbaF6X5sgGi90JmxKwDdZtjqnzE7VBe9QWtaJ
Cancel-Lock: sha1:mbZIr/0q2Ztw9vazErR8IbNJHWY= sha256:1pvip7E+GtwJxc/77wGR/PCEK/TF0DTEX7iTnjvvFRM=
X-Face: \}2`P"_@pS86<'EM:'b.Ml}8IuMK"pV"?FReF$'c.S%u9<Q#U*4QO)$l81M`{Q/n
XL'`91kd%N::LG:=*\35JS0prp\VJN^<s"b#bff@fA7]5lJA.jn,x_d%Md$,{.EZ
X-Tongue-In-Cheek: in the old-timey way, of course
User-Agent: Pan/0.159 (Vovchansk; 26ff567; Linux-6.11.0-rc1)
View all headers

On Sat, 03 Aug 2024 06:21:23 -0500, X, formerly known as \"!Jones\" wrote:

> If you have a medical emergency, stop reading, log off, and dial 911!
>
>>I've wondered about this for a while. Just asked about it in sci.crypt,
>>we'll see what they say.
>
> I would expect the level of discussion regarding cryptography there to
> mirror the deep thought into the politics of guns in talk.politics.guns.

Take a look and see.

My geek reading time is currently taken up reading _UNIX: A History
and a Memoir_, but I am curious how one would crack it.

--
-c

Subject: Re: PRNG Crypto
From: R Kym Horsell
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Organization: kymhorsell.com
Date: Sun, 4 Aug 2024 12:21 UTC
References: 1 2 3 4 5 6 7 8 9 10 11
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: kymhorsell@gmail.com (R Kym Horsell)
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: PRNG Crypto
Date: Sun, 4 Aug 2024 12:21:53 -0000 (UTC)
Organization: kymhorsell.com
Sender: R Kym Horsell <kym@otaku.sdf.org>
Message-ID: <v8nrp1$24bv$1@nnrp.usenet.blueworldhosting.com>
References: <v8bqbo$17n0k$1@dont-email.me> <mt6jajtdgpjvrlqm1ifden2i6ue47843iv@4ax.com> <SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com> <pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me> <66abe7ee$0$1427989$882e4bbb@reader.netnews.com> <g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com> <lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net> <1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com> <lh90lfF6q3tU5@mid.individual.net>
Reply-To: kymhorsell@gmail.com
Injection-Date: Sun, 4 Aug 2024 12:21:53 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="70015"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: tin/2.6.2-20221225 ("Pittyvaich") (NetBSD/9.3 (amd64))
Cancel-Lock: sha1:c4oW4Jmlud49HEtGkH2kIsCrNTw= sha256:adMTSgsZHaa9ntRd00MD7uYKsDVxzCtG2DBR077R4tw=
sha1:99oQWr0bsAcR8R2jzXXUCe3PWSE= sha256:glLLi3BdFetEp2MwJn9lF8az4osFqwnYhxvHdED3yjM=
View all headers

In alt.global-warming Creon <creon@creon.earth> wrote:
> On Sat, 03 Aug 2024 06:21:23 -0500, X, formerly known as \"!Jones\" wrote:
>
>> If you have a medical emergency, stop reading, log off, and dial 911!
>>
>>>I've wondered about this for a while. Just asked about it in sci.crypt,
>>>we'll see what they say.
>>
>> I would expect the level of discussion regarding cryptography there to
>> mirror the deep thought into the politics of guns in talk.politics.guns.
>
> Take a look and see.
>
> My geek reading time is currently taken up reading _UNIX: A History
> and a Memoir_, but I am curious how one would crack it.
.....

Cracking a "one time pad" can sometimes rely on the encoding being lazy.
A PRNG generally comes in several different forms. Try each form until
you at least get some partial matches.
If you have a quantum computer you can of course test all possible
n-bit numbers for all the parameters of the RNG at the same time.
Strong cryptographic RNG rely on other forms of randomness that may be
harder to crack. E.g. noise in a cpu or computer memory or
thermal noise in a bank of resistors or simular.
But I've noticed with my own machines that have "strong rng" based on
pools of garbage the O/S keeps on hand the rng are not all that random
and seem to have patches where they "get stuck" in long strings of
correlated bit. A traditional cracker might try to find just parts of the
message that appear to have "pseudo" rather than "real" randomness and just
a few bits every now and then may give some useful knowlege of what
the message was about and who is talking/listening.
Some of this is just the modern spin on "lazy clerk". E.g. nomencaltor
codes were once real polar -- relating words and common numbers with
(usually) one of a selection of random numbers.
Code cracking relied sometimes on the fact the dumb human doing the
encrypting tended to memorize one or 2 choices for a given code number
and use it over and over making enough samples from that coder
easier to crack.

Subject: Re: PRNG Crypto
From: Nadegda
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Organization: A noiseless patient Spider
Date: Thu, 8 Aug 2024 22:06 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: nad318b404@gmail.invalid (Nadegda)
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: PRNG Crypto
Date: Thu, 8 Aug 2024 22:06:55 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 68
Message-ID: <v93fhu$9a0n$1@dont-email.me>
References: <v8bqbo$17n0k$1@dont-email.me>
<mt6jajtdgpjvrlqm1ifden2i6ue47843iv@4ax.com>
<SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com>
<pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com>
<v8dob6$1lrot$3@dont-email.me>
<66abe7ee$0$1427989$882e4bbb@reader.netnews.com>
<g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com>
<lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net>
<1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com>
<lh90lfF6q3tU5@mid.individual.net>
<v8nrp1$24bv$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 09 Aug 2024 00:06:55 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="d7f3f3bd028c2ecaf10c0afa1f71a3e1";
logging-data="305175"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+OWJ4aqKbJN73LID6M5tjYaKH7VNeyBCE="
Summary: Murphy is a kook with hundreds, if not thousands, of sock puppets
Keywords: Murphy
Cancel-Lock: sha1:/tXXsVhekgUsGbREfYA4MQ1dhAo=
X-Newsreader: Forte Agent 5.00/32.1171
View all headers

Time to trigger the right-wing snowflakes again. Melt, snowflakes, melt!
On Sun, 04 Aug 2024 12:21:53 +0000, R Kym Horsell wrote:

> In alt.global-warming Creon <creon@creon.earth> wrote:
>> On Sat, 03 Aug 2024 06:21:23 -0500, X, formerly known as \"!Jones\" wrote:
>>
>>> If you have a medical emergency, stop reading, log off, and dial 911!
>>>
>>>>I've wondered about this for a while. Just asked about it in sci.crypt,
>>>>we'll see what they say.
>>>
>>> I would expect the level of discussion regarding cryptography there to
>>> mirror the deep thought into the politics of guns in talk.politics.guns.
>>
>> Take a look and see.
>>
>> My geek reading time is currently taken up reading _UNIX: A History
>> and a Memoir_, but I am curious how one would crack it.
> ....
>
> Cracking a "one time pad" can sometimes rely on the encoding being lazy.
> A PRNG generally comes in several different forms. Try each form until
> you at least get some partial matches.
> If you have a quantum computer you can of course test all possible
> n-bit numbers for all the parameters of the RNG at the same time.
> Strong cryptographic RNG rely on other forms of randomness that may be
> harder to crack. E.g. noise in a cpu or computer memory or
> thermal noise in a bank of resistors or simular.
> But I've noticed with my own machines that have "strong rng" based on
> pools of garbage the O/S keeps on hand the rng are not all that random
> and seem to have patches where they "get stuck" in long strings of
> correlated bit. A traditional cracker might try to find just parts of the
> message that appear to have "pseudo" rather than "real" randomness and just
> a few bits every now and then may give some useful knowlege of what
> the message was about and who is talking/listening.
> Some of this is just the modern spin on "lazy clerk". E.g. nomencaltor
> codes were once real polar -- relating words and common numbers with
> (usually) one of a selection of random numbers.
> Code cracking relied sometimes on the fact the dumb human doing the
> encrypting tended to memorize one or 2 choices for a given code number
> and use it over and over making enough samples from that coder
> easier to crack.

OTP is impossible to crack. Even if you use a brute-force search of the
key space, you can't distinguish between the correct decoded plaintext
and every other possible plaintext of the same length. In other words,
say I encode "Trump is a colossal dickhead", which is 28 characters long,
with a random 28 character OTP using XOR. Or perhaps I instead encode
"The operation begins at noon". Also 28 characters long. In both cases,
the set of every possible ciphertext I could get from XOR OTP is the
same, and so no matter what ciphertext you have in your hand the set of
possible plaintexts includes both "The operation begins at noon" and
"Trump is a colossal dickhead". It also includes, for example, "The
operation begins at four". And five and nine and 0N00 for every N.

You can't even be sure whether I'm encrypting battle plans or potentially
repressed political speech, let alone what hour the attack will come, even
after a brute force search of the key space.

That's why OTP is considered unbreakable.

--
FNVWe Nadegda

"By all means, compare these shitheads to Nazis. Again and again. I'm with
you." -- Mike Godwin, Aug 13, 2017, 8:03 PM
Checkmate admits that, for all intents and purposes, he carries a teddy
bear in public: <d6cnes.ket.17.19@news.alt.net>

Subject: Re: PRNG Crypto
From: %
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate, alt.tits
Date: Thu, 8 Aug 2024 22:16 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12 13
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!border-1.nntp.ord.giganews.com!nntp.giganews.com!local-2.nntp.ord.giganews.com!Xl.tags.giganews.com!local-4.nntp.ord.giganews.com!news.giganews.com.POSTED!not-for-mail
NNTP-Posting-Date: Thu, 08 Aug 2024 22:16:56 +0000
Subject: Re: PRNG Crypto
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate,alt.tits
References: <v8bqbo$17n0k$1@dont-email.me>
<mt6jajtdgpjvrlqm1ifden2i6ue47843iv@4ax.com>
<SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com>
<pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me>
<66abe7ee$0$1427989$882e4bbb@reader.netnews.com>
<g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com>
<lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net>
<1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com>
<lh90lfF6q3tU5@mid.individual.net>
<v8nrp1$24bv$1@nnrp.usenet.blueworldhosting.com>
<v93fhu$9a0n$1@dont-email.me>
From: pursent100@gmail.com (%)
Date: Thu, 8 Aug 2024 15:16:56 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:91.0) Gecko/20100101
Firefox/91.0 SeaMonkey/2.53.18.2
MIME-Version: 1.0
In-Reply-To: <v93fhu$9a0n$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Antivirus: AVG (VPS 240808-2, 2024-8-8), Outbound message
X-Antivirus-Status: Clean
Message-ID: <WkidnW9x_LdF3ij7nZ2dnZfqnPcAAAAA@giganews.com>
Lines: 63
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-uR7cbk6CVKLkkwbEFanaDewJxOBA6OPFJiHRgl/DWdbjYZESVwjKpeBrzuhAijV8/mwkrNvb7C8V4JY!P9ISuONNjH/o1pnxCnO8/9cHuE8Fvf+Klcw4DT+HL1rO52gbGedYCfTwOGigVii5UN0oMI65YHWZ
X-Complaints-To: abuse@giganews.com
X-DMCA-Notifications: http://www.giganews.com/info/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
View all headers

Nadegda wrote:
> Time to trigger the right-wing snowflakes again. Melt, snowflakes, melt!
> On Sun, 04 Aug 2024 12:21:53 +0000, R Kym Horsell wrote:
>
>> In alt.global-warming Creon <creon@creon.earth> wrote:
>>> On Sat, 03 Aug 2024 06:21:23 -0500, X, formerly known as \"!Jones\" wrote:
>>>
>>>> If you have a medical emergency, stop reading, log off, and dial 911!
>>>>
>>>>> I've wondered about this for a while. Just asked about it in sci.crypt,
>>>>> we'll see what they say.
>>>>
>>>> I would expect the level of discussion regarding cryptography there to
>>>> mirror the deep thought into the politics of guns in talk.politics.guns.
>>>
>>> Take a look and see.
>>>
>>> My geek reading time is currently taken up reading _UNIX: A History
>>> and a Memoir_, but I am curious how one would crack it.
>> ....
>>
>> Cracking a "one time pad" can sometimes rely on the encoding being lazy.
>> A PRNG generally comes in several different forms. Try each form until
>> you at least get some partial matches.
>> If you have a quantum computer you can of course test all possible
>> n-bit numbers for all the parameters of the RNG at the same time.
>> Strong cryptographic RNG rely on other forms of randomness that may be
>> harder to crack. E.g. noise in a cpu or computer memory or
>> thermal noise in a bank of resistors or simular.
>> But I've noticed with my own machines that have "strong rng" based on
>> pools of garbage the O/S keeps on hand the rng are not all that random
>> and seem to have patches where they "get stuck" in long strings of
>> correlated bit. A traditional cracker might try to find just parts of the
>> message that appear to have "pseudo" rather than "real" randomness and just
>> a few bits every now and then may give some useful knowlege of what
>> the message was about and who is talking/listening.
>> Some of this is just the modern spin on "lazy clerk". E.g. nomencaltor
>> codes were once real polar -- relating words and common numbers with
>> (usually) one of a selection of random numbers.
>> Code cracking relied sometimes on the fact the dumb human doing the
>> encrypting tended to memorize one or 2 choices for a given code number
>> and use it over and over making enough samples from that coder
>> easier to crack.
>
> OTP is impossible to crack. Even if you use a brute-force search of the
> key space, you can't distinguish between the correct decoded plaintext
> and every other possible plaintext of the same length. In other words,
> say I encode "Trump is a colossal dickhead", which is 28 characters long,
> with a random 28 character OTP using XOR. Or perhaps I instead encode
> "The operation begins at noon". Also 28 characters long. In both cases,
> the set of every possible ciphertext I could get from XOR OTP is the
> same, and so no matter what ciphertext you have in your hand the set of
> possible plaintexts includes both "The operation begins at noon" and
> "Trump is a colossal dickhead". It also includes, for example, "The
> operation begins at four". And five and nine and 0N00 for every N.
>
> You can't even be sure whether I'm encrypting battle plans or potentially
> repressed political speech, let alone what hour the attack will come, even
> after a brute force search of the key space.
>
> That's why OTP is considered unbreakable.
>
hi boner

Subject: Re: PRNG Crypto
From: R Kym Horsell
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Organization: kymhorsell.com
Date: Thu, 8 Aug 2024 23:10 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12 13
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: kymhorsell@gmail.com (R Kym Horsell)
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: PRNG Crypto
Date: Thu, 8 Aug 2024 23:10:10 -0000 (UTC)
Organization: kymhorsell.com
Sender: R Kym Horsell <kym@otaku.sdf.org>
Message-ID: <v93j8i$2qqd$1@nnrp.usenet.blueworldhosting.com>
References: <v8bqbo$17n0k$1@dont-email.me> <mt6jajtdgpjvrlqm1ifden2i6ue47843iv@4ax.com> <SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com> <pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me> <66abe7ee$0$1427989$882e4bbb@reader.netnews.com> <g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com> <lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net> <1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com> <lh90lfF6q3tU5@mid.individual.net> <v8nrp1$24bv$1@nnrp.usenet.blueworldhosting.com> <v93fhu$9a0n$1@dont-email.me>
Reply-To: kymhorsell@gmail.com
Injection-Date: Thu, 8 Aug 2024 23:10:10 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="93005"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: tin/2.6.2-20221225 ("Pittyvaich") (NetBSD/9.3 (amd64))
Cancel-Lock: sha1:rz1kBco2w0+gIMqnnCaZJRBSfjA= sha256:CP4S2j2MmNfvWbeQMOtrYaDq7etONfdCeM+dlzfNo8E=
sha1:Qep5kvWbGeFoRVWvMNJq5FruTCU= sha256:4hztIuE2sFZdJVcpfG5eKLORrtbxB3ztKqBs35IoS3M=
View all headers

In alt.global-warming Nadegda <nad318b404@gmail.invalid> wrote:
> Time to trigger the right-wing snowflakes again. Melt, snowflakes, melt!
> On Sun, 04 Aug 2024 12:21:53 +0000, R Kym Horsell wrote:
>
>> In alt.global-warming Creon <creon@creon.earth> wrote:
>>> On Sat, 03 Aug 2024 06:21:23 -0500, X, formerly known as \"!Jones\" wrote:
>>>
>>>> If you have a medical emergency, stop reading, log off, and dial 911!
>>>>
>>>>>I've wondered about this for a while. Just asked about it in sci.crypt,
>>>>>we'll see what they say.
>>>>
>>>> I would expect the level of discussion regarding cryptography there to
>>>> mirror the deep thought into the politics of guns in talk.politics.guns.
>>>
>>> Take a look and see.
>>>
>>> My geek reading time is currently taken up reading _UNIX: A History
>>> and a Memoir_, but I am curious how one would crack it.
>> ....
>>
>> Cracking a "one time pad" can sometimes rely on the encoding being lazy.
>> A PRNG generally comes in several different forms. Try each form until
>> you at least get some partial matches.
>> If you have a quantum computer you can of course test all possible
>> n-bit numbers for all the parameters of the RNG at the same time.
>> Strong cryptographic RNG rely on other forms of randomness that may be
>> harder to crack. E.g. noise in a cpu or computer memory or
>> thermal noise in a bank of resistors or simular.
>> But I've noticed with my own machines that have "strong rng" based on
>> pools of garbage the O/S keeps on hand the rng are not all that random
>> and seem to have patches where they "get stuck" in long strings of
>> correlated bit. A traditional cracker might try to find just parts of the
>> message that appear to have "pseudo" rather than "real" randomness and just
>> a few bits every now and then may give some useful knowlege of what
>> the message was about and who is talking/listening.
>> Some of this is just the modern spin on "lazy clerk". E.g. nomencaltor
>> codes were once real polar -- relating words and common numbers with
>> (usually) one of a selection of random numbers.
>> Code cracking relied sometimes on the fact the dumb human doing the
>> encrypting tended to memorize one or 2 choices for a given code number
>> and use it over and over making enough samples from that coder
>> easier to crack.
>
> OTP is impossible to crack. Even if you use a brute-force search of the
....

So are nomenclators. They dont use them any more because they are too easy.

With AI's there are "people" that can 1 trillion times a second
decide whether something is possibly English or some other natural language.
With quantum computers the speed is essentially infinite.
So you're imagined reason for "impossibility" is all too flawed.
Just because someone wrote something that sounded reasonable
in the 1950s is no reason to accept it as true without a rigorous
mathematical proof. :)

--
<kaggle.com/kymhorsell1>

Subject: Re: PRNG Crypto
From: kensi
Newsgroups: talk.politics.guns, alt.global-warming
Organization: To protect and to server
Date: Sat, 10 Aug 2024 02:13 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12 13 14
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: kkensington01-NOSPAM@gmail.invalid (kensi)
Newsgroups: talk.politics.guns,alt.global-warming
Subject: Re: PRNG Crypto
Date: Fri, 9 Aug 2024 22:13:37 -0400
Organization: To protect and to server
Message-ID: <v96icg$1p7fn$1@paganini.bofh.team>
References: <v8bqbo$17n0k$1@dont-email.me>
<mt6jajtdgpjvrlqm1ifden2i6ue47843iv@4ax.com>
<SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com>
<pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me>
<66abe7ee$0$1427989$882e4bbb@reader.netnews.com>
<g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com>
<lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net>
<1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com>
<lh90lfF6q3tU5@mid.individual.net>
<v8nrp1$24bv$1@nnrp.usenet.blueworldhosting.com>
<v93fhu$9a0n$1@dont-email.me>
<v93j8i$2qqd$1@nnrp.usenet.blueworldhosting.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 10 Aug 2024 02:13:37 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="1875447"; posting-host="7++Cbf0/m7Aoy1byKmPGSA.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: Mozilla Thunderbird
X-Notice: Filtered by postfilter v. 0.9.3
Content-Language: en-US
View all headers

On 2024-08-08 7:10 p.m., R Kym Horsell wrote:
> In alt.global-warming Nadegda <nad318b404@gmail.invalid> wrote:
>> Time to trigger the right-wing snowflakes again. Melt, snowflakes, melt!
>> On Sun, 04 Aug 2024 12:21:53 +0000, R Kym Horsell wrote:
>>
>>> In alt.global-warming Creon <creon@creon.earth> wrote:
>>>> On Sat, 03 Aug 2024 06:21:23 -0500, X, formerly known as \"!Jones\" wrote:
>>>>
>>>>> If you have a medical emergency, stop reading, log off, and dial 911!
>>>>>
>>>>>> I've wondered about this for a while. Just asked about it in sci.crypt,
>>>>>> we'll see what they say.
>>>>>
>>>>> I would expect the level of discussion regarding cryptography there to
>>>>> mirror the deep thought into the politics of guns in talk.politics.guns.
>>>>
>>>> Take a look and see.
>>>>
>>>> My geek reading time is currently taken up reading _UNIX: A History
>>>> and a Memoir_, but I am curious how one would crack it.
>>> ....
>>>
>>> Cracking a "one time pad" can sometimes rely on the encoding being lazy.
>>> A PRNG generally comes in several different forms. Try each form until
>>> you at least get some partial matches.
>>> If you have a quantum computer you can of course test all possible
>>> n-bit numbers for all the parameters of the RNG at the same time.
>>> Strong cryptographic RNG rely on other forms of randomness that may be
>>> harder to crack. E.g. noise in a cpu or computer memory or
>>> thermal noise in a bank of resistors or simular.
>>> But I've noticed with my own machines that have "strong rng" based on
>>> pools of garbage the O/S keeps on hand the rng are not all that random
>>> and seem to have patches where they "get stuck" in long strings of
>>> correlated bit. A traditional cracker might try to find just parts of the
>>> message that appear to have "pseudo" rather than "real" randomness and just
>>> a few bits every now and then may give some useful knowlege of what
>>> the message was about and who is talking/listening.
>>> Some of this is just the modern spin on "lazy clerk". E.g. nomencaltor
>>> codes were once real polar -- relating words and common numbers with
>>> (usually) one of a selection of random numbers.
>>> Code cracking relied sometimes on the fact the dumb human doing the
>>> encrypting tended to memorize one or 2 choices for a given code number
>>> and use it over and over making enough samples from that coder
>>> easier to crack.
>>
>> OTP is impossible to crack. Even if you use a brute-force search of the
> ...
>
> So are nomenclators. They dont use them any more because they are too easy.
>
> With AI's there are "people" that can 1 trillion times a second
> decide whether something is possibly English or some other natural language.
> With quantum computers the speed is essentially infinite.
> So you're imagined reason for "impossibility" is all too flawed.
> Just because someone wrote something that sounded reasonable
> in the 1950s is no reason to accept it as true without a rigorous
> mathematical proof. :)

Nadegda, you might want to let this one go. We have an old saying here:
you can lead a Horsell to water, but you can't make her drink.

*snicker*

--
"To explain the unknown by the known is a logical procedure; to explain
the known by the unknown is a form of theological lunacy." ~David Brooks
"I get fooled all the time by the constant hosiery parade
in here." ~Checkmate

Subject: Re: PRNG Crypto
From: X, formerly known as
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Organization: A noiseless patient Spider
Date: Sun, 11 Aug 2024 00:22 UTC
References: 1 2 3 4 5 6 7 8 9 10 11
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: x@y.com (X, formerly known as \"!Jones\")
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: PRNG Crypto
Date: Sat, 10 Aug 2024 19:22:08 -0500
Organization: A noiseless patient Spider
Lines: 77
Message-ID: <01qfbjdosuhgum6d8mt2g77igji2f494kq@4ax.com>
References: <SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com> <pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me> <66abe7ee$0$1427989$882e4bbb@reader.netnews.com> <g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com> <lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net> <1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com> <lh90lfF6q3tU5@mid.individual.net> <v8nrp1$24bv$1@nnrp.usenet.blueworldhosting.com> <v93fhu$9a0n$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 11 Aug 2024 02:22:09 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="4b0817d14ec1ef1a65a986c57ba7f71a";
logging-data="1040521"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19X0d/vF3ZYbQvGGIq51gx2"
Cancel-Lock: sha1:csUHq4sbooNY33q4dBz2jDyYw3A=
X-Newsreader: Forte Agent 1.8/32.548
View all headers

If you have a medical emergency, stop reading, log off, and dial 911!

>Time to trigger the right-wing snowflakes again. Melt, snowflakes, melt!
>On Sun, 04 Aug 2024 12:21:53 +0000, R Kym Horsell wrote:
>
>> In alt.global-warming Creon <creon@creon.earth> wrote:
>>> On Sat, 03 Aug 2024 06:21:23 -0500, X, formerly known as \"!Jones\" wrote:
>>>
>>>> If you have a medical emergency, stop reading, log off, and dial 911!
>>>>
>>>>>I've wondered about this for a while. Just asked about it in sci.crypt,
>>>>>we'll see what they say.
>>>>
>>>> I would expect the level of discussion regarding cryptography there to
>>>> mirror the deep thought into the politics of guns in talk.politics.guns.
>>>
>>> Take a look and see.
>>>
>>> My geek reading time is currently taken up reading _UNIX: A History
>>> and a Memoir_, but I am curious how one would crack it.
>> ....
>>
>> Cracking a "one time pad" can sometimes rely on the encoding being lazy.
>> A PRNG generally comes in several different forms. Try each form until
>> you at least get some partial matches.
>> If you have a quantum computer you can of course test all possible
>> n-bit numbers for all the parameters of the RNG at the same time.
>> Strong cryptographic RNG rely on other forms of randomness that may be
>> harder to crack. E.g. noise in a cpu or computer memory or
>> thermal noise in a bank of resistors or simular.
>> But I've noticed with my own machines that have "strong rng" based on
>> pools of garbage the O/S keeps on hand the rng are not all that random
>> and seem to have patches where they "get stuck" in long strings of
>> correlated bit. A traditional cracker might try to find just parts of the
>> message that appear to have "pseudo" rather than "real" randomness and just
>> a few bits every now and then may give some useful knowlege of what
>> the message was about and who is talking/listening.
>> Some of this is just the modern spin on "lazy clerk". E.g. nomencaltor
>> codes were once real polar -- relating words and common numbers with
>> (usually) one of a selection of random numbers.
>> Code cracking relied sometimes on the fact the dumb human doing the
>> encrypting tended to memorize one or 2 choices for a given code number
>> and use it over and over making enough samples from that coder
>> easier to crack.
>
>OTP is impossible to crack. Even if you use a brute-force search of the
>key space, you can't distinguish between the correct decoded plaintext
>and every other possible plaintext of the same length. In other words,
>say I encode "Trump is a colossal dickhead", which is 28 characters long,
>with a random 28 character OTP using XOR. Or perhaps I instead encode
>"The operation begins at noon". Also 28 characters long. In both cases,
>the set of every possible ciphertext I could get from XOR OTP is the
>same, and so no matter what ciphertext you have in your hand the set of
>possible plaintexts includes both "The operation begins at noon" and
>"Trump is a colossal dickhead". It also includes, for example, "The
>operation begins at four". And five and nine and 0N00 for every N.
>
>You can't even be sure whether I'm encrypting battle plans or potentially
>repressed political speech, let alone what hour the attack will come, even
>after a brute force search of the key space.
>
>That's why OTP is considered unbreakable.

Oh, come on. That's the first lesson of the first class on crypto.
"I have a secret. I bet you can't guess what it is!"

When I was a young person in the '60s, my housemates and I puffed a
little pot... OK, maybe more than a *little*. We devised great
schemes as to how we'd hide our stash; I won't go into all of them,
but hiding a bag of pot is easy. The issue was that we had pot and
residue thereof tracked all over that house. A detector dog wouldn't
have known where to alert first.

There you have the issue with a one-time pad. I can encrypt it, but
*now* what? As soon as I try to send it, I must expose the key.
(Solution: Ite-ray eee-thay eee-kay n ig-pay atin-lay.)

Subject: Re: PRNG Crypto
From: R Kym Horsell
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Organization: kymhorsell.com
Date: Sun, 11 Aug 2024 01:20 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: kymhorsell@gmail.com (R Kym Horsell)
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: PRNG Crypto
Date: Sun, 11 Aug 2024 01:20:27 -0000 (UTC)
Organization: kymhorsell.com
Sender: R Kym Horsell <kym@otaku.sdf.org>
Message-ID: <v993kq$1tc7$1@nnrp.usenet.blueworldhosting.com>
References: <SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com> <pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me> <66abe7ee$0$1427989$882e4bbb@reader.netnews.com> <g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com> <lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net> <1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com> <lh90lfF6q3tU5@mid.individual.net> <v8nrp1$24bv$1@nnrp.usenet.blueworldhosting.com> <v93fhu$9a0n$1@dont-email.me> <01qfbjdosuhgum6d8mt2g77igji2f494kq@4ax.com>
Reply-To: kymhorsell@gmail.com
Injection-Date: Sun, 11 Aug 2024 01:20:27 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="62855"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: tin/2.6.2-20221225 ("Pittyvaich") (NetBSD/9.3 (amd64))
Cancel-Lock: sha1:Enx9yGPYXkSoCrPZNzTrQU3URe8= sha256:pRmb/tdZtRm5xY8OpxKiyVlgxFwgBHD8hYV1whHEF1g=
sha1:PaQrqLHb9QUHLgwGfxc8YCTPEWg= sha256:m0pLFb0oyZGdgXUlIeRQ1r+As018IIdFjCwv2Xhwrh8=
View all headers

In alt.global-warming "X, formerly known as \"!Jones\"" <x@y.com> wrote:
> If you have a medical emergency, stop reading, log off, and dial 911!
>
>>Time to trigger the right-wing snowflakes again. Melt, snowflakes, melt!
>>On Sun, 04 Aug 2024 12:21:53 +0000, R Kym Horsell wrote:
>>
>>> In alt.global-warming Creon <creon@creon.earth> wrote:
>>>> On Sat, 03 Aug 2024 06:21:23 -0500, X, formerly known as \"!Jones\" wrote:
>>>>
>>>>> If you have a medical emergency, stop reading, log off, and dial 911!
>>>>>
>>>>>>I've wondered about this for a while. Just asked about it in sci.crypt,
>>>>>>we'll see what they say.
>>>>>
>>>>> I would expect the level of discussion regarding cryptography there to
>>>>> mirror the deep thought into the politics of guns in talk.politics.guns.
>>>>
>>>> Take a look and see.
>>>>
>>>> My geek reading time is currently taken up reading _UNIX: A History
>>>> and a Memoir_, but I am curious how one would crack it.
>>> ....
>>>
>>> Cracking a "one time pad" can sometimes rely on the encoding being lazy.
>>> A PRNG generally comes in several different forms. Try each form until
>>> you at least get some partial matches.
>>> If you have a quantum computer you can of course test all possible
>>> n-bit numbers for all the parameters of the RNG at the same time.
>>> Strong cryptographic RNG rely on other forms of randomness that may be
>>> harder to crack. E.g. noise in a cpu or computer memory or
>>> thermal noise in a bank of resistors or simular.
>>> But I've noticed with my own machines that have "strong rng" based on
>>> pools of garbage the O/S keeps on hand the rng are not all that random
>>> and seem to have patches where they "get stuck" in long strings of
>>> correlated bit. A traditional cracker might try to find just parts of the
>>> message that appear to have "pseudo" rather than "real" randomness and just
>>> a few bits every now and then may give some useful knowlege of what
>>> the message was about and who is talking/listening.
>>> Some of this is just the modern spin on "lazy clerk". E.g. nomencaltor
>>> codes were once real polar -- relating words and common numbers with
>>> (usually) one of a selection of random numbers.
>>> Code cracking relied sometimes on the fact the dumb human doing the
>>> encrypting tended to memorize one or 2 choices for a given code number
>>> and use it over and over making enough samples from that coder
>>> easier to crack.
>>
>>OTP is impossible to crack. Even if you use a brute-force search of the
>>key space, you can't distinguish between the correct decoded plaintext
>>and every other possible plaintext of the same length. In other words,
>>say I encode "Trump is a colossal dickhead", which is 28 characters long,
>>with a random 28 character OTP using XOR. Or perhaps I instead encode
>>"The operation begins at noon". Also 28 characters long. In both cases,
>>the set of every possible ciphertext I could get from XOR OTP is the
>>same, and so no matter what ciphertext you have in your hand the set of
>>possible plaintexts includes both "The operation begins at noon" and
>>"Trump is a colossal dickhead". It also includes, for example, "The
>>operation begins at four". And five and nine and 0N00 for every N.
>>
>>You can't even be sure whether I'm encrypting battle plans or potentially
>>repressed political speech, let alone what hour the attack will come, even
>>after a brute force search of the key space.
>>
>>That's why OTP is considered unbreakable.
>
> Oh, come on. That's the first lesson of the first class on crypto.
> "I have a secret. I bet you can't guess what it is!"
>
> When I was a young person in the '60s, my housemates and I puffed a
> little pot... OK, maybe more than a *little*. We devised great
> schemes as to how we'd hide our stash; I won't go into all of them,
> but hiding a bag of pot is easy. The issue was that we had pot and
> residue thereof tracked all over that house. A detector dog wouldn't
> have known where to alert first.
>
> There you have the issue with a one-time pad. I can encrypt it, but
> *now* what? As soon as I try to send it, I must expose the key.
> (Solution: Ite-ray eee-thay eee-kay n ig-pay atin-lay.)
>

Some time back -- maybe 30y or so -- I used to look in on sci.crypt every
now and then.
People trying to cement themselves in the clown basket back then
used to send encrypted messages and challenge all comers to break them.
Pretty much is is a "one time pad" since there is only the one message.
There used to be a couple strong guys down at the BRL that run
some of these things through their machinery. At least one time some
poster geolocating to the USSR got a surprise that it was "easy" to
read their new supposed super code. Even if the guys at BRL could not
get an English translation they sometimes could figure out how many
words were in it, how long the words were, and sometimes a topic
(e.g. guessing from words inside the "challenege" post).
At one time I posted an AI solution to one of the challenges.
Even given very little codetext an AI can sometimes twiddle the dials
and start to get some parts of the clear.
The technique was enough to give some people on the group a jolt.
I often "harp" on the impossibility of keeping a secret. There are
good mathematical reasons for presuming this is so. With various
"breakthroughs" (possibly known for decades :) it seems likely
the old idea of keeping the code messages and later when the key
has been stolen somehow then going back and reading the messages
might have a new twist. Some techniques have been demonstrated
that should allow information to be sent back in time.
And they say RSA is now broken. :)

Subject: Re: PRNG Crypto
From: %
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Date: Sun, 11 Aug 2024 01:48 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12 13
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!border-1.nntp.ord.giganews.com!nntp.giganews.com!local-1.nntp.ord.giganews.com!Xl.tags.giganews.com!local-4.nntp.ord.giganews.com!news.giganews.com.POSTED!not-for-mail
NNTP-Posting-Date: Sun, 11 Aug 2024 01:48:42 +0000
Subject: Re: PRNG Crypto
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
References: <SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com>
<pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me>
<66abe7ee$0$1427989$882e4bbb@reader.netnews.com>
<g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com>
<lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net>
<1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com>
<lh90lfF6q3tU5@mid.individual.net>
<v8nrp1$24bv$1@nnrp.usenet.blueworldhosting.com>
<v93fhu$9a0n$1@dont-email.me> <01qfbjdosuhgum6d8mt2g77igji2f494kq@4ax.com>
<v993kq$1tc7$1@nnrp.usenet.blueworldhosting.com>
From: pursent100@gmail.com (%)
Date: Sat, 10 Aug 2024 18:48:41 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:91.0) Gecko/20100101
Firefox/91.0 SeaMonkey/2.53.18.2
MIME-Version: 1.0
In-Reply-To: <v993kq$1tc7$1@nnrp.usenet.blueworldhosting.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Antivirus: AVG (VPS 240810-4, 2024-8-10), Outbound message
X-Antivirus-Status: Clean
Message-ID: <xIGdnfpopo7nhSX7nZ2dnZfqn_udnZ2d@giganews.com>
Lines: 106
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-90mzCJtKnp2/b5ZV1Rpv99yzaskOSl6oNQJ2zlYbSCjXNkYoXgPRJDfe4FosERKDq1VhKvSL36it0jk!heMjsdRU+TFYQFicu2JI8uOc8qdbBsP8q8yitNgniuIG1ThlGdnCx9/BBeoKMA8t4HrMRwMQO79+
X-Complaints-To: abuse@giganews.com
X-DMCA-Notifications: http://www.giganews.com/info/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
View all headers

R Kym Horsell wrote:
> In alt.global-warming "X, formerly known as \"!Jones\"" <x@y.com> wrote:
>> If you have a medical emergency, stop reading, log off, and dial 911!
>>
>>> Time to trigger the right-wing snowflakes again. Melt, snowflakes, melt!
>>> On Sun, 04 Aug 2024 12:21:53 +0000, R Kym Horsell wrote:
>>>
>>>> In alt.global-warming Creon <creon@creon.earth> wrote:
>>>>> On Sat, 03 Aug 2024 06:21:23 -0500, X, formerly known as \"!Jones\" wrote:
>>>>>
>>>>>> If you have a medical emergency, stop reading, log off, and dial 911!
>>>>>>
>>>>>>> I've wondered about this for a while. Just asked about it in sci.crypt,
>>>>>>> we'll see what they say.
>>>>>>
>>>>>> I would expect the level of discussion regarding cryptography there to
>>>>>> mirror the deep thought into the politics of guns in talk.politics.guns.
>>>>>
>>>>> Take a look and see.
>>>>>
>>>>> My geek reading time is currently taken up reading _UNIX: A History
>>>>> and a Memoir_, but I am curious how one would crack it.
>>>> ....
>>>>
>>>> Cracking a "one time pad" can sometimes rely on the encoding being lazy.
>>>> A PRNG generally comes in several different forms. Try each form until
>>>> you at least get some partial matches.
>>>> If you have a quantum computer you can of course test all possible
>>>> n-bit numbers for all the parameters of the RNG at the same time.
>>>> Strong cryptographic RNG rely on other forms of randomness that may be
>>>> harder to crack. E.g. noise in a cpu or computer memory or
>>>> thermal noise in a bank of resistors or simular.
>>>> But I've noticed with my own machines that have "strong rng" based on
>>>> pools of garbage the O/S keeps on hand the rng are not all that random
>>>> and seem to have patches where they "get stuck" in long strings of
>>>> correlated bit. A traditional cracker might try to find just parts of the
>>>> message that appear to have "pseudo" rather than "real" randomness and just
>>>> a few bits every now and then may give some useful knowlege of what
>>>> the message was about and who is talking/listening.
>>>> Some of this is just the modern spin on "lazy clerk". E.g. nomencaltor
>>>> codes were once real polar -- relating words and common numbers with
>>>> (usually) one of a selection of random numbers.
>>>> Code cracking relied sometimes on the fact the dumb human doing the
>>>> encrypting tended to memorize one or 2 choices for a given code number
>>>> and use it over and over making enough samples from that coder
>>>> easier to crack.
>>>
>>> OTP is impossible to crack. Even if you use a brute-force search of the
>>> key space, you can't distinguish between the correct decoded plaintext
>>> and every other possible plaintext of the same length. In other words,
>>> say I encode "Trump is a colossal dickhead", which is 28 characters long,
>>> with a random 28 character OTP using XOR. Or perhaps I instead encode
>>> "The operation begins at noon". Also 28 characters long. In both cases,
>>> the set of every possible ciphertext I could get from XOR OTP is the
>>> same, and so no matter what ciphertext you have in your hand the set of
>>> possible plaintexts includes both "The operation begins at noon" and
>>> "Trump is a colossal dickhead". It also includes, for example, "The
>>> operation begins at four". And five and nine and 0N00 for every N.
>>>
>>> You can't even be sure whether I'm encrypting battle plans or potentially
>>> repressed political speech, let alone what hour the attack will come, even
>>> after a brute force search of the key space.
>>>
>>> That's why OTP is considered unbreakable.
>>
>> Oh, come on. That's the first lesson of the first class on crypto.
>> "I have a secret. I bet you can't guess what it is!"
>>
>> When I was a young person in the '60s, my housemates and I puffed a
>> little pot... OK, maybe more than a *little*. We devised great
>> schemes as to how we'd hide our stash; I won't go into all of them,
>> but hiding a bag of pot is easy. The issue was that we had pot and
>> residue thereof tracked all over that house. A detector dog wouldn't
>> have known where to alert first.
>>
>> There you have the issue with a one-time pad. I can encrypt it, but
>> *now* what? As soon as I try to send it, I must expose the key.
>> (Solution: Ite-ray eee-thay eee-kay n ig-pay atin-lay.)
>>
>
> Some time back -- maybe 30y or so -- I used to look in on sci.crypt every
> now and then.
> People trying to cement themselves in the clown basket back then
> used to send encrypted messages and challenge all comers to break them.
> Pretty much is is a "one time pad" since there is only the one message.
> There used to be a couple strong guys down at the BRL that run
> some of these things through their machinery. At least one time some
> poster geolocating to the USSR got a surprise that it was "easy" to
> read their new supposed super code. Even if the guys at BRL could not
> get an English translation they sometimes could figure out how many
> words were in it, how long the words were, and sometimes a topic
> (e.g. guessing from words inside the "challenege" post).
> At one time I posted an AI solution to one of the challenges.
> Even given very little codetext an AI can sometimes twiddle the dials
> and start to get some parts of the clear.
> The technique was enough to give some people on the group a jolt.
> I often "harp" on the impossibility of keeping a secret. There are
> good mathematical reasons for presuming this is so. With various
> "breakthroughs" (possibly known for decades :) it seems likely
> the old idea of keeping the code messages and later when the key
> has been stolen somehow then going back and reading the messages
> might have a new twist. Some techniques have been demonstrated
> that should allow information to be sent back in time.
> And they say RSA is now broken. :)
>
and this has what to do with global warming

Subject: Re: PRNG Crypto
From: R Kym Horsell
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Organization: kymhorsell.com
Date: Sun, 11 Aug 2024 03:13 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12 13 14
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: kymhorsell@gmail.com (R Kym Horsell)
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: PRNG Crypto
Date: Sun, 11 Aug 2024 03:13:45 -0000 (UTC)
Organization: kymhorsell.com
Sender: R Kym Horsell <kym@otaku.sdf.org>
Message-ID: <v99a99$6qk$1@nnrp.usenet.blueworldhosting.com>
References: <SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com> <pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me> <66abe7ee$0$1427989$882e4bbb@reader.netnews.com> <g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com> <lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net> <1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com> <lh90lfF6q3tU5@mid.individual.net> <v8nrp1$24bv$1@nnrp.usenet.blueworldhosting.com> <v93fhu$9a0n$1@dont-email.me> <01qfbjdosuhgum6d8mt2g77igji2f494kq@4ax.com> <v993kq$1tc7$1@nnrp.usenet.blueworldhosting.com> <xIGdnfpopo7nhSX7nZ2dnZfqn_udnZ2d@giganews.com>
Reply-To: kymhorsell@gmail.com
Injection-Date: Sun, 11 Aug 2024 03:13:45 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="6996"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: tin/2.6.2-20221225 ("Pittyvaich") (NetBSD/9.3 (amd64))
Cancel-Lock: sha1:FS41M+MgcSSY+QuKG7OKXydBvoQ= sha256:jQwQ3qj1y0u7+cyf2MDairVhPm3AFXKGGU/Y8uxL/h0=
sha1:SnfxoRxJ78895izd9kpUdfBNCBI= sha256:1nB1ffw6iCXRo3c11+yLMI7MskURAu5jteJoOOzDTAE=
View all headers

In alt.global-warming notpresent <notpresdent@gmail.com> wrote:
> R Kym Horsell wrote:
>> In alt.global-warming "X, formerly known as \"!Jones\"" <x@y.com> wrote:
>>> If you have a medical emergency, stop reading, log off, and dial 911!
....
> and this has what to do with global warming

An exercise in the basic physics, the understanding of science
and application of scientific principles.

Probably moot point for indiv that can't correctly guess
anything about a poster given they use their real name and
posted the URL for their linkedin info.

--
Retrieving information from a black hole using quantum machine learning
High Energy Phys. Hayden and Preskill showed that information can be
retrieved from a black hole that is sufficiently scrambling, assuming that
the retriever has perfect control of the emitted Hawking radiation and
perfect knowledge of the internal dynamics of the black hole.
-- PhysRevA.106.062434

Subject: Re: πŸ³οΈβ€πŸŒˆPRNG CryptoπŸ³οΈβ€πŸŒˆ
From: Zersterer
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Date: Sun, 11 Aug 2024 03:24 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12 13
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: nochsfentor@yahoo.com (Zersterer)
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: πŸ³οΈβ€πŸŒˆPRNG CryptoπŸ³οΈβ€
🌈
Date: Sat, 10 Aug 2024 22:24:46 -0500
Lines: 77
Message-ID: <lhqp7vF1vkrU5@mid.individual.net>
References: <SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com>
<pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me>
<66abe7ee$0$1427989$882e4bbb@reader.netnews.com>
<g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com>
<lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net>
<1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com>
<lh90lfF6q3tU5@mid.individual.net>
<v8nrp1$24bv$1@nnrp.usenet.blueworldhosting.com>
<v93fhu$9a0n$1@dont-email.me> <01qfbjdosuhgum6d8mt2g77igji2f494kq@4ax.com>
<=3D?U=3D?UTF-8?Q?T?=3DF-8?Q?=3DF0=3D9F=3D8C=3DBA?=3Db.dfgkRtGmNVB7m@23.167.64.247=3D?U=3D?UTF-8?Q?T?=3DF-8?Q?=3DF0=3D9F=3D8C=3DBA?=3D>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Trace: individual.net BNk7pXgLdRiPTmHatSYm0gkGE1g3g4gk+ItHw2WdOLPHCDrQsE
Cancel-Lock: sha1:j6ETxst5y/l4w8dCxgw83HM3Rt4= sha256:9o+zzH/StmLcw8tsoXlP07xZFFjccUNHlJUUOT9v7Vk=
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:91.0) Gecko/20100101
Firefox/91.0 SeaMonkey/2.53.18.2
In-Reply-To: <=3D?U=3D?UTF-8?Q?T?=3DF-8?Q?=3DF0=3D9F=3D8C=3DBA?=3Db.dfgkRtGmNVB7m@23.167.64.247=3D?U=3D?UTF-8?Q?T?=3DF-8?Q?=3DF0=3D9F=3D8C=3DBA?=3D>
View all headers

πŸŒˆπŸ’πŸŒ»πŸŒΊπŸŒΉπŸŒ»πŸ’πŸŒ·πŸŒΊπŸŒˆ Jen πŸŒˆπŸ’πŸŒ»πŸŒΊπŸŒΉπŸŒ»πŸ’πŸŒ·πŸŒΊπŸŒˆ Dershmender
πŸ’πŸŒ»πŸŒΊπŸŒΉπŸŒ»πŸ’πŸŒ·πŸŒΊπŸΆη¬›πŸŒˆπŸ’πŸŒ»πŸŒΊπŸŒΉπŸŒ»πŸ’πŸŒ·πŸŒΊπŸŒˆ wrote:
> On Sat, 10 Aug 2024 19:22:08 -0500, LO AND BEHOLD; "X, formerly known as
> \"!Jones\"" <x@y.com> determined that the following was of great
> importance to "X, formerly known as \"!Jones\"" <x@y.com> and
> subsequently decided to freely share it with us in
> <01qfbjdosuhgum6d8mt2g77igji2f494kq@4ax.com>:
>
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= If you have a medical emergency, stop reading, log off, and dial 911!
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?=
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= Time to trigger the right-wing snowflakes again. Melt, snowflakes, melt!
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= On Sun, 04 Aug 2024 12:21:53 +0000, R Kym Horsell wrote:
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= In alt.global-warming Creon <creon@creon.earth> wrote:
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= On Sat, 03 Aug 2024 06:21:23 -0500, X, formerly known as \"!Jones\"
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= wrote:
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= If you have a medical emergency, stop reading, log off, and dial 911!
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= I've wondered about this for a while. Just asked about it in sci.crypt,
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= we'll see what they say.
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= I would expect the level of discussion regarding cryptography there to
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= mirror the deep thought into the politics of guns in
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= talk.politics.guns.
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= Take a look and see. My geek reading time is currently taken up reading
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= _UNIX: A History and a Memoir_, but I am curious how one would crack it.
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= .... Cracking a "one time pad" can sometimes rely on the encoding being
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= lazy. A PRNG generally comes in several different forms. Try each form
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= until you at least get some partial matches. If you have a quantum
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= computer you can of course test all possible n-bit numbers for all the
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= parameters of the RNG at the same time. Strong cryptographic RNG rely on
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= other forms of randomness that may be harder to crack. E.g. noise in a
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= cpu or computer memory or thermal noise in a bank of resistors or
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= simular. But I've noticed with my own machines that have "strong rng"
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= based on pools of garbage the O/S keeps on hand the rng are not all
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= that random and seem to have patches where they "get stuck" in long
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= strings of correlated bit. A traditional cracker might try to find
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= just parts of the message that appear to have "pseudo" rather than
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= "real" randomness and just a few bits every now and then may give some
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= useful knowlege of what the message was about and who is
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= talking/listening. Some of this is just the modern spin on "lazy
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= clerk". E.g. nomencaltor codes were once real polar -- relating words
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= and common numbers with (usually) one of a selection of random numbers.
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= Code cracking relied sometimes on the fact the dumb human doing the
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= encrypting tended to memorize one or 2 choices for a given code number
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= and use it over and over making enough samples from that coder easier to
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= crack.
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= OTP is impossible to crack. Even if you use a brute-force search of the
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= key space, you can't distinguish between the correct decoded plaintext
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= and every other possible plaintext of the same length. In other words,
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= say I encode "Trump is a colossal dickhead", which is 28 characters
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= long, with a random 28 character OTP using XOR. Or perhaps I instead
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= encode "The operation begins at noon". Also 28 characters long. In both
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= cases, the set of every possible ciphertext I could get from XOR OTP is
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= the same, and so no matter what ciphertext you have in your hand the
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= set of possible plaintexts includes both "The operation begins at noon"
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= and "Trump is a colossal dickhead". It also includes, for example, "The
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= operation begins at four". And five and nine and 0N00 for every N. You
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= can't even be sure whether I'm encrypting battle plans or potentially
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= repressed political speech, let alone what hour the attack will come,
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= even after a brute force search of the key space. That's why OTP is
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= considered unbreakable.
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?=
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= Oh, come on. That's the first lesson of the first class on crypto. "I
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= have a secret. I bet you can't guess what it is!"
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?=
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= When I was a young person in the '60s, my housemates and I puffed a
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= little pot... OK, maybe more than a *little*. We devised great schemes
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= as to how we'd hide our stash; I won't go into all of them, but hiding
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= a bag of pot is easy. The issue was that we had pot and residue thereof
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= tracked all over that house. A detector dog wouldn't have known where
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= to alert first.
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?=
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= There you have the issue with a one-time pad. I can encrypt it, but
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= *now* what? As soon as I try to send it, I must expose the key.
> =?UTF-8?B?8J+Ps++4j+KAjfCfjIg=?= (Solution: Ite-ray eee-thay eee-kay n ig-pay atin-lay.)


Click here to read the complete article
Subject: Re: PRNG Crypto
From: Zersterer
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Date: Sun, 11 Aug 2024 03:26 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: nochsfentor@yahoo.com (Zersterer)
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: PRNG Crypto
Date: Sat, 10 Aug 2024 22:26:54 -0500
Lines: 21
Message-ID: <lhqpbuF1vkrU6@mid.individual.net>
References: <SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com>
<pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me>
<66abe7ee$0$1427989$882e4bbb@reader.netnews.com>
<g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com>
<lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net>
<1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com>
<lh90lfF6q3tU5@mid.individual.net>
<v8nrp1$24bv$1@nnrp.usenet.blueworldhosting.com>
<v93fhu$9a0n$1@dont-email.me> <01qfbjdosuhgum6d8mt2g77igji2f494kq@4ax.com>
<v993kq$1tc7$1@nnrp.usenet.blueworldhosting.com>
<xIGdnfpopo7nhSX7nZ2dnZfqn_udnZ2d@giganews.com>
<v99a99$6qk$1@nnrp.usenet.blueworldhosting.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net nrrZq52YuHebL5VhGndMcge1W43/IIImKnS0aur9YC5ojkExcQ
Cancel-Lock: sha1:jh9qTJ4zfZX3Uh3IavZoykNbfL4= sha256:0A+7FrVokawxPIuKzP5waPV2go3EK4agWCon5KNszgw=
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:91.0) Gecko/20100101
Firefox/91.0 SeaMonkey/2.53.18.2
In-Reply-To: <v99a99$6qk$1@nnrp.usenet.blueworldhosting.com>
View all headers

R Kym Horsell wrote:
> In alt.global-warming notpresent <notpresdent@gmail.com> wrote:
>> R Kym Horsell wrote:
>>> In alt.global-warming "X, formerly known as \"!Jones\"" <x@y.com> wrote:
>>>> If you have a medical emergency, stop reading, log off, and dial 911!
> ...
>> and this has what to do with global warming
>
> An exercise in the basic physics, the understanding of science
> and application of scientific principles.
>
> Probably moot point for indiv that can't correctly guess
> anything about a poster given they use their real name and
> posted the URL for their linkedin info.
>
K Rim Horsebell,

Usenet was created with the intention of exposing all it's users to your
outerfilthing. Seize the day and post some addresses. Most of the RFCs
will tell you where that guy parks his car, and using your key on it
shouldn't take much resolve.

Subject: Re: PRNG Crypto
From: R Kym Horsell
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Organization: kymhorsell.com
Date: Sun, 11 Aug 2024 04:15 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: kymhorsell@gmail.com (R Kym Horsell)
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: PRNG Crypto
Date: Sun, 11 Aug 2024 04:15:13 -0000 (UTC)
Organization: kymhorsell.com
Sender: R Kym Horsell <kym@otaku.sdf.org>
Message-ID: <v99dsh$2dna$1@nnrp.usenet.blueworldhosting.com>
References: <SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com> <pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v8dob6$1lrot$3@dont-email.me> <66abe7ee$0$1427989$882e4bbb@reader.netnews.com> <g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com> <lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net> <1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com> <lh90lfF6q3tU5@mid.individual.net> <v8nrp1$24bv$1@nnrp.usenet.blueworldhosting.com> <v93fhu$9a0n$1@dont-email.me> <01qfbjdosuhgum6d8mt2g77igji2f494kq@4ax.com> <v993kq$1tc7$1@nnrp.usenet.blueworldhosting.com> <xIGdnfpopo7nhSX7nZ2dnZfqn_udnZ2d@giganews.com> <v99a99$6qk$1@nnrp.usenet.blueworldhosting.com> <lhqpbuF1vkrU6@mid.individual.net>
Reply-To: kymhorsell@gmail.com
Injection-Date: Sun, 11 Aug 2024 04:15:13 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="79594"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: tin/2.6.2-20221225 ("Pittyvaich") (NetBSD/9.3 (amd64))
Cancel-Lock: sha1:L1O+d6+ac+0tpyIlgg2WYFf9law= sha256:n1UrZvQ2Tiz1AyX8RiH2fSGvD6nbgFyQYT+oZlhuLow=
sha1:ZRIOK8DE0HbD3hQCtQsSVzmtN4M= sha256:iOOpAfvEsJteJ59BL4uYygTSNtEthmxtps532En3Xug=
View all headers

In alt.global-warming nitwit#79 <nitwit#79@yahoo.com> wrote:
> R Kym Horsell wrote:
>> In alt.global-warming notpresent <notpresdent@gmail.com> wrote:
>>> R Kym Horsell wrote:
>>>> In alt.global-warming "X, formerly known as \"!Jones\"" <x@y.com> wrote:
>>>>> If you have a medical emergency, stop reading, log off, and dial 911!
>> ...
>>> and this has what to do with global warming
>> An exercise in the basic physics, the understanding of science
>> and application of scientific principles.
>> Probably moot point for indiv that can't correctly guess
>> anything about a poster given they use their real name and
>> posted the URL for their linkedin info.
> K Rim Horsebell,
> Usenet was created with the intention of exposing all it's users to your
> outerfilthing. Seize the day and post some addresses. Most of the RFCs
> will tell you where that guy parks his car, and using your key on it
> shouldn't take much resolve.

When I was in freshman physics there were a lot of guys up
the back of the class that used to throw paper darts when the material
started getting non-trivial.

I asked one of the profs about it and he told me -- with the vast
experience of 40y herding physics 101 students -- that the kids
throwing darts were usually the ones that washed out in first year.
Normally, her underlined, they tried to keep students going until
at least 3rd year because it attracted more funding.

I interpret a lot of stuff I see x-posted from t.p.g as paper darts.

Now y'all can too.

--
Psychologists have determined some people are terrified of math.
By attaching electrodes to the legs of experimental subjects, then
feeding them problems like adding up a column of numbers, they found
thinking about math caused unconscious flexing of muscles normally
used for running.
They found math triggered at least the "flight" part of the fear
response.
Why would a psychologist do that? I hear someone in the audience ask.
Answer: Because it's fun!
Addendum: It's speculated some people exhibit the same kind of
response in any learning situation. C.f. Dunning and Kruger's work on
(in)competence.

Subject: Re: PRNG Crypto
From: Develle
Newsgroups: alt.checkmate, alt.global-warming, talk.politics.guns
Date: Sun, 11 Aug 2024 09:07 UTC
References: 1 2 3 4 5 6 7
From: develle@ac.ox.uk (Develle)
Injection-Info: neodome.net;
posting-account="mail2news";
key="d5K+5OkGXQC/Ww0ZztCKBpFAWRhoXnTF+Q+wu7UXtNIdmGhTnJ/hIM1PRnIwUssY5oB/IS
Fu2EoitkyW10q/0OtZRB/HHuZgDSN1u1Dxs22zTPx51Q9FnYdk//n0cMN3zGOlFngq1DDrQSYnZ
sV+nT/GrU8WeNwhApN0TcuUjUmeTG1ehw7yBp2HRivV0MMPl2Y60r5i3U4TUZo0DABDCnhkUFTW
eOOYi8UPCi7XA4Mddbdr4faZ4DxfurYRj3RRN3gChMU5xfqzhbssrHJ0SFmOPxOdd6WNspUIpMk
8QtnMbt2V8hG5Qmp2/lsn0qhIDX+WMgg25WqQB054/nIUzw==";
data="U2FsdGVkX1+1uHPaiy2Xh5cRnAvVom9lbVVfEzGmCS88XyUYpj6CJ0tiAtgQJzwnODqRw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";
mail-complaints-to="abuse@neodome.net"
Sender: Fritz Wuehler <fritz@spamexpire-202408.rodent.frell.theremailer.net>
Subject: Re: PRNG Crypto
Date: Sun, 11 Aug 2024 11:07:56 +0200
Injection-Date: Sun, 11 Aug 2024 09:10:01 +0000 (UTC)
Newsgroups: alt.checkmate,alt.global-warming,talk.politics.guns
Comments: This message did not originate from the Sender address above.
It was remailed automatically by anonymizing remailer software.
Please report problems or inappropriate use to the
remailer administrator at <abuse@frell.theremailer.net>.
Identifying the real sender is technically impossible.
Comments: This message was transferred to Usenet via mail2news gateway at
<mail2news@neodome.net>. Please send questions and concerns to
<admin@neodome.net>. Report inappropriate use to <abuse@neodome.net>.
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.mixmin.net!news.neodome.net!mail2news
Message-ID: <7710da556da3fe99ffb0e439128e79bd@msgid.frell.theremailer.net>
References: <SfydnbyLReAwAzT7nZ2dnZfqn_ednZ2d@giganews.com> <pjnkaj109lr47rbcoltugecabv46rdr0ci@4ax.com> <v993kq$1tc7$1@nnrp.usenet.blueworldhosting.com> <xIGdnfpopo7nhSX7nZ2dnZfqn_udnZ2d@giganews.com> <v99a99$6qk$1@nnrp.usenet.blueworldhosting.com> <lhqpbuF1vkrU6@mid.individual.net> <v99dsh$2dna$1@nnrp.usenet.blueworldhosting.com>
View all headers

On 10 Aug 2024, R Kym Horsell <kymhorsell@gmail.com> posted some
news:v99dsh$2dna$1@nnrp.usenet.blueworldhosting.com:

> In alt.global-warming nitwit#79 <nitwit#79@yahoo.com> wrote:
>> R Kym Horsell wrote:
>>> In alt.global-warming notpresent <notpresdent@gmail.com> wrote:
>>>> R Kym Horsell wrote:
>>>>> In alt.global-warming "X, formerly known as \"!Jones\"" <x@y.com>
>>>>> wrote:
>>>>>> If you have a medical emergency, stop reading, log off, and dial
>>>>>> 911!
>>> ...
>>>> and this has what to do with global warming
>>> An exercise in the basic physics, the understanding of science
>>> and application of scientific principles.
>>> Probably moot point for indiv that can't correctly guess
>>> anything about a poster given they use their real name and
>>> posted the URL for their linkedin info.
>> K Rim Horsebell,
>> Usenet was created with the intention of exposing all it's users to
>> your outerfilthing. Seize the day and post some addresses. Most of
>> the RFCs will tell you where that guy parks his car, and using your
>> key on it shouldn't take much resolve.
>
> When I was in freshman physics there were a lot of guys up
> the back of the class that used to throw paper darts when the material
> started getting non-trivial.
>
> I asked one of the profs about it and he told me -- with the vast
> experience of 40y herding physics 101 students -- that the kids
> throwing darts were usually the ones that washed out in first year.
> Normally, her underlined, they tried to keep students going until
> at least 3rd year because it attracted more funding.
>
> I interpret a lot of stuff I see x-posted from t.p.g as paper darts.
>
> Now y'all can too.

You know how you can find out who won't make it past the first year?

Introduce them to Ethiopian mathmatics. Those who get it fail. Those who
don't become professors.

Subject: Re: PRNG Crypto
From: X, formerly known as
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Organization: A noiseless patient Spider
Date: Sun, 11 Aug 2024 21:47 UTC
References: 1 2 3 4 5 6 7 8 9 10 11
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: x@y.com (X, formerly known as \"!Jones\")
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: PRNG Crypto
Date: Sun, 11 Aug 2024 16:47:02 -0500
Organization: A noiseless patient Spider
Lines: 48
Message-ID: <ufbibjhtv1ml7oec514icdmqutihfi1cgg@4ax.com>
References: <v8dob6$1lrot$3@dont-email.me> <66abe7ee$0$1427989$882e4bbb@reader.netnews.com> <g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com> <lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net> <1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com> <lh90lfF6q3tU5@mid.individual.net> <v8nrp1$24bv$1@nnrp.usenet.blueworldhosting.com> <v93fhu$9a0n$1@dont-email.me> <01qfbjdosuhgum6d8mt2g77igji2f494kq@4ax.com> <v993kq$1tc7$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 11 Aug 2024 23:47:04 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="4b0817d14ec1ef1a65a986c57ba7f71a";
logging-data="3027366"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+5kis8SFrRv9NuTNitX03P"
Cancel-Lock: sha1:x+hJgaQJvsT9zK1DOWqQ3wPf5J0=
X-Newsreader: Forte Agent 1.8/32.548
View all headers

If you have a medical emergency, stop reading, log off, and dial 911!

>Some time back -- maybe 30y or so -- I used to look in on sci.crypt every
>now and then.
>People trying to cement themselves in the clown basket back then
>used to send encrypted messages and challenge all comers to break them.
>Pretty much is is a "one time pad" since there is only the one message.
>There used to be a couple strong guys down at the BRL that run
>some of these things through their machinery. At least one time some
>poster geolocating to the USSR got a surprise that it was "easy" to
>read their new supposed super code. Even if the guys at BRL could not
>get an English translation they sometimes could figure out how many
>words were in it, how long the words were, and sometimes a topic
>(e.g. guessing from words inside the "challenege" post).
>At one time I posted an AI solution to one of the challenges.
>Even given very little codetext an AI can sometimes twiddle the dials
>and start to get some parts of the clear.
>The technique was enough to give some people on the group a jolt.
>I often "harp" on the impossibility of keeping a secret. There are
>good mathematical reasons for presuming this is so. With various
>"breakthroughs" (possibly known for decades :) it seems likely
>the old idea of keeping the code messages and later when the key
>has been stolen somehow then going back and reading the messages
>might have a new twist. Some techniques have been demonstrated
>that should allow information to be sent back in time.
>And they say RSA is now broken. :)

Oh, there haven't been any *new* seminal developments in crypto in
years. RSA stands as long as the assumption that factoring a number
is a problem of exponential order stands. If you crack my 128-bit
encryption, I can double your cost by adding one bit to the algorithm.
(It is unproven that factoring has exponential order. We live in fear
that one day, some grad student will present a paper and... OH,
*SHIT*!)

How long does the encrypted message have to remain secret? (Are U.S.
Grant's plans to take Vicksburg still a secret?) I got a kick out of
the scene in *Windtalkers* (won an Oscar for stupidest movie, I hear)
where the good guys are telling the naval gunners to elevate by 250...
or something... but the bad guys couldn't figure out what they were
saying. (I bet they knew pretty soon.)

Point here being that, if it takes you two weeks to crack the code,
it's probably good enough.

If RSA is ever *broken* broken, we're in deep doodoo. Just because
somebody managed to run MD-5 backwards doesn't make it *broken*.

Subject: Re: PRNG Crypto
From: R Kym Horsell
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Organization: kymhorsell.com
Date: Mon, 12 Aug 2024 02:57 UTC
References: 1 2 3 4 5 6 7 8 9 10 11 12
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!panix!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: kymhorsell@gmail.com (R Kym Horsell)
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Re: PRNG Crypto
Date: Mon, 12 Aug 2024 02:57:05 -0000 (UTC)
Organization: kymhorsell.com
Sender: R Kym Horsell <kym@otaku.sdf.org>
Message-ID: <v9btm1$1s0c$1@nnrp.usenet.blueworldhosting.com>
References: <v8dob6$1lrot$3@dont-email.me> <66abe7ee$0$1427989$882e4bbb@reader.netnews.com> <g71oajlnsdmnumq1c1ohqlgt5ajtdtvr24@4ax.com> <lh6fglFsh0qU2@mid.individual.net> <lh6g0bFsh0qU3@mid.individual.net> <1e4sajpph20585949cgi3g06e4gl3v0eor@4ax.com> <lh90lfF6q3tU5@mid.individual.net> <v8nrp1$24bv$1@nnrp.usenet.blueworldhosting.com> <v93fhu$9a0n$1@dont-email.me> <01qfbjdosuhgum6d8mt2g77igji2f494kq@4ax.com> <v993kq$1tc7$1@nnrp.usenet.blueworldhosting.com> <ufbibjhtv1ml7oec514icdmqutihfi1cgg@4ax.com>
Reply-To: kymhorsell@gmail.com
Injection-Date: Mon, 12 Aug 2024 02:57:05 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="61452"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: tin/2.6.2-20221225 ("Pittyvaich") (NetBSD/9.3 (amd64))
Cancel-Lock: sha1:s/U5HiY7i9ouCHSEwEWhW/xkQ+M= sha256:SMDmqgI6hmoNxt+G1tJnqgCxCIvC2XE1HIfnB+6DZPY=
sha1:VPhgihhK9476dE32juSzPWAA7+s= sha256:DfUEriQecwW6znvoB7NXjqH1TuH/SctIEiTX1l80Od4=
View all headers

In alt.global-warming "X, formerly known as \"!Jones\"" <x@y.com> wrote:
> If you have a medical emergency, stop reading, log off, and dial 911!
>
>>Some time back -- maybe 30y or so -- I used to look in on sci.crypt every
>>now and then.
>>People trying to cement themselves in the clown basket back then
>>used to send encrypted messages and challenge all comers to break them.
>>Pretty much is is a "one time pad" since there is only the one message.
>>There used to be a couple strong guys down at the BRL that run
>>some of these things through their machinery. At least one time some
>>poster geolocating to the USSR got a surprise that it was "easy" to
>>read their new supposed super code. Even if the guys at BRL could not
>>get an English translation they sometimes could figure out how many
>>words were in it, how long the words were, and sometimes a topic
>>(e.g. guessing from words inside the "challenege" post).
>>At one time I posted an AI solution to one of the challenges.
>>Even given very little codetext an AI can sometimes twiddle the dials
>>and start to get some parts of the clear.
>>The technique was enough to give some people on the group a jolt.
>>I often "harp" on the impossibility of keeping a secret. There are
>>good mathematical reasons for presuming this is so. With various
>>"breakthroughs" (possibly known for decades :) it seems likely
>>the old idea of keeping the code messages and later when the key
>>has been stolen somehow then going back and reading the messages
>>might have a new twist. Some techniques have been demonstrated
>>that should allow information to be sent back in time.
>>And they say RSA is now broken. :)
>
> Oh, there haven't been any *new* seminal developments in crypto in
> years. RSA stands as long as the assumption that factoring a number
> is a problem of exponential order stands. If you crack my 128-bit
> encryption, I can double your cost by adding one bit to the algorithm.
....

Funny stuff. The 128 kinda dates your textbook.
Normal s/w these days will stop you using anything less than 512.

Subject: Reading 849-34 (archive)
From: JTEM
Newsgroups: talk.politics.guns, alt.global-warming, alt.checkmate
Organization: Eek
Date: Thu, 19 Dec 2024 21:16 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: jtem01@gmail.com (JTEM)
Newsgroups: talk.politics.guns,alt.global-warming,alt.checkmate
Subject: Reading 849-34 (archive)
Date: Thu, 19 Dec 2024 16:16:54 -0500
Organization: Eek
Lines: 14
Message-ID: <vk22g7$315me$3@dont-email.me>
References: <v8bqbo$17n0k$1@dont-email.me>
<susiajh7pbor1jj0fqnb49ssfuagkot0lk@Rudy.Canoza.is.a.forging.cocksucking.dwarf.com>
<v8btp1$189tr$3@dont-email.me>
<6DKdnXszfOt75zT7nZ2dnZfqnPadnZ2d@giganews.com>
Reply-To: jtem01@gmail.com
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 19 Dec 2024 22:16:55 +0100 (CET)
Injection-Info: dont-email.me; posting-host="9ff4b2c72f87ca13969f9178127d152c";
logging-data="3184334"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19mwPCz+97XIZ3VVtf1VhRE"
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:gpZy0mKkrkdzuZx0hZXe8fwxdCg=
In-Reply-To: <6DKdnXszfOt75zT7nZ2dnZfqnPadnZ2d@giganews.com>
Content-Language: en-US
View all headers

Imagine being so detached from reality that the President
of the United States is paying for terrorist attacks on
the streets of Moscow and you're pissing yourself in fear
over the thought that the planet may warm up to something
closer to it's pre ice age norm...

You're well trained, not well informed.

--
https://jtem.tumblr.com/tagged/The%20Book%20of%20JTEM/page/5

Pages:1234567

rocksolid light 0.9.8
clearnet tor