Schlagwort: Kryptographie

Now for the real B.

I hope you enjoy your day, whether you are reading this or not!

Hashoe.

If you have that file (“Cinderella”) you can create that hash (a glass shoe that fits her) but you cannot go back the other way (you cannot create a Cinderella from the shoe!). Possessing the shoe also does not tell you where Cinderella is Possesing the shoe does not allow the prince to home in on her location - it does not give clues like “warmer” or “colder”

Dominic Tarr: fairly tale cryptography 2: hashes

Future Fun.

If you read this after upgrading a remote system to buster, ping the system on the network continuously as this adds entropy to the randomness pool and the system will eventually be reachable by ssh again.

Debian 10 buster release notes: 5.1.4. Daemons fail to start or system appears to hang during boot

Sicherhörnchen.

Beziehungsfrage des Tages: Bei wem würdest du ein Backup hinterlassen? Bei wem nur ein verschlüsseltes?

Sovernyptasm.

I wake up in the morning, the smartphone no longer sleeps at my side, almost no wifi passes through my house. The coffee machine and the refrigerator are free from the internet of things, they do not connect to Starfucks + Monosanto to send my consumer data. On the table there is a tablet built to last for life. All my devices are encrypted by default and come from a local factory a few kilometres away.

Some years ago, some biohackers popularised the use of bacteria and trace elements for storing digital information. Moore's law was broken. Planned obsolescence was made illegal. The cycles of war, hunger and injustice created by the extraction of minerals and the mass production of technologies, gradually disappeared. At school we generated encryption keys: in Primary School using antiquated technologies like GPG, and later using processes based on the analysis of our sound imprint when having an orgasm.

Alex Haché: Technological Sovereignty: Learning to love machines again in: Technological Sovereignty, Vol. 2