Re: Leaked evidence shows that Assange arrest came after Wikileaks publisher refused to name sources.

2020-03-06 Thread Zenaan Harkness
On Wed, Mar 04, 2020 at 12:06:00PM +1100, Zenaan Harkness wrote:
> - Forwarded message from "Phillip Adams via Change.org" 
>  -
> 
> From: "Phillip Adams via Change.org" 
> Date: Wed, 04 Mar 2020 00:30:08 +
> Subject: Leaked evidence shows that Assange arrest came after Wikileaks
>  publisher refused to name sources.
> List-Id: 
> 
> 
> Phillip Adams shared an update on Free Julian Assange, before it's too 
> late. Sign to STOP the USA Extradition
> 
> Check it out and leave a comment:
> 
> Petition Update
> 
> Leaked evidence shows that Assange arrest came after Wikileaks publisher 
> refused to name sources.
>   Hi All, We are over 330,000 signatories.  Click this link, read it, then 
> read it again and then read it one more time. Understand the gravity of what 
> is contained in this powerful article. May the murdered DNC staffer Mr Seth 
> Rich R.I.P.   ...
> https://click.e.change.org/f/a/pergscKKencb-qqu1B56Ew~~/AANj1QA~/RgRgQXuQP4QnAWh0dHBzOi8vd3d3LmNoYW5nZS5vcmcvcC9mcmVlLWp1bGlhbi1hc3NhbmdlLWJlZm9yZS1pdC1zLXRvby1sYXRlLXN0b3AtdXNhLWV4dHJhZGl0aW9uL3UvMjU4Mzc4NjY_Y3NfdGs9QWpNNGJCTFlCRDhGT1JEcllsNEFBWGljeXl2TnlRRUFCRjhCdklhT2VxNHh3Skg3UEF1X3pxVEJpNVUlM0QmdXRtX2NhbXBhaWduPTk3ZGRjNWNjZDRiNDQ0ODliNTA2N2MwYTA2MTdhOWEwJnV0bV9jb250ZW50PWluaXRpYWxfdjBfMl8wJnV0bV9tZWRpdW09ZW1haWwmdXRtX3NvdXJjZT1wZXRpdGlvbl91cGRhdGUmdXRtX3Rlcm09Y3NXA3NwY0IKACWR9l5ejmEsU1IeemVuYWFuLmNoYW5nZS5vcmdAZnJlZWRibXMubmV0WAQC



Hitlery Clinton: "If only the damn Seth Rich story would just die already!  
Die?  Oh, I mean go away already!"


  Seth Rich, Julian Assange, & Dana Rohrabacher - Will We Ever Know The Truth 
About The Stolen DNC Files?
  
https://www.zerohedge.com/political/seth-rich-julian-assange-dana-rohrabacher-will-we-ever-know-truth-about-stolen-dnc-files
  Authored by Philip Giraldi via The American Herald Tribune,
  https://ahtribune.com/us/3928-seth-rich-assange-dana-rohrabacher.html

The media is doing its best to make the Seth Rich story go away, but it 
seems to have a life of its own, possibly due to the fact that the accepted 
narrative about how Rich died makes no sense.

In its latest manifestation, it provides an alternative explanation for 
just how the information from the Democratic National Committee (DNC) computer 
somehow made its way to Wikileaks. If you believe that Jeffrey Epstein 
committed suicide and that he was just a nasty pedophile rather than an Israeli 
intelligence agent, read no farther because you will not be interested in Rich. 
But if you appreciate that it was unlikely that the Russians were behind the 
stealing of the DNC information you will begin to understand that other 
interested players must have been at work.

For those who are not familiar with it, the backstory to the murder of 
apparently disgruntled Democratic National Committee staffer Seth Rich, who 
some days before may have been the leaker of that organization’s confidential 
emails to Wikileaks, suggests that a possibly motiveless crime might have been 
anything but.

https://www.yahoo.com/news/julian-assange-fuels-conspiracy-theories-00062.html

The Washington D.C. police investigated what they believed to be an 
attempted robbery gone bad but that theory fails to explain why Rich’s money, 
credit cards, cell phone and watch were not taken. Wikileaks has never 
confirmed that Rich was their source in the theft of the proprietary emails 
that had hitherto been blamed on Russia but it subsequently offered a $20,000 
reward for information leading to resolution of the case and Julian Assange, 
perhaps tellingly, has never publicly clarified whether Rich was or was not one 
of his contacts, though there is at least one report that he confirmed the 
relationship during a private meeting.
https://americanfreepress.net/feds-still-lying-about-seth-rich/

Answers to the question who exactly stole the files from the DNC server and 
the emails from John Podesta have led to what has been called Russiagate, a 
tale that has been embroidered upon and which continues to resonate in American 
politics. At this point, all that is clearly known is that in the Summer of 
2016 files and emails pertaining to the election were copied and then made 
their way to WikiLeaks, which published some of them at a time that was 
damaging to the Clinton campaign.

Those who are blaming Russia believe that there was a hack of the 
Democratic National Committee (DNC) server and also of John Podesta’s emails 
that was carried out by a Russian surrogate or directly by Moscow’s military 
intelligence arm.

...



UFO 'Bigger Than Earth' Flying Past the Sun 'Spotted' by NASA Observation Mission - Sputnik - Ezekiel's wheels

2020-03-06 Thread Zenaan Harkness
Does Ezekiel return?  Did he ever leave?  Given that all UFOs are "just 
conspiracy theories," we know this can be nothing other than a weather balloon.

STEREO "just happened" to stop working just 4s in, and "just happened" to start 
working again once this object was no longer in view.

Sometimes a few seconds slip into the public stream.

We live in interesting times...



UFO 'Bigger Than Earth' Flying Past the Sun 'Spotted' by NASA Observation 
Mission
https://sputniknews.com/viral/202003061078494363-ufo-bigger-than-earth-flying-past-the-sun-spotted-by-nasa-observation-mission/

  The development comes weeks after a camera at the International Space Station 
spotted an unknown cone-like object that was flying upward.

  NASA’s STEREO observation mission has spotted what fans of conspiracy 
theories said is a gigantic UFO flying past the Sun. The incident itself 
occurred on 29 February [2020], but the footage of it was posted just recently 
on the channel “Hidden Underbelly 2.0” dedicated to mysterious events and 
sightings. According to the host, STEREO’s camera filmed the humongous object 
for four seconds after which it turned off and began working only after the UFO 
passed.

  The "humongous object" appears to be bigger than Mercury, Venus, and the 
Earth. "You can tell this thing doesn’t look like our space station, no way. It 
doesn’t look like any satellite that I have seen. To be honest, when I first 
saw the footage I thought: Ezekiel’s Wheel! It’s very similar – the circle with 
a cross in it", the host said.

  The host refers to a saying in the Book of Ezekiel, where the prophet spoke 
about a flying chariot, which he described as a “wheel in the middle of a 
wheel”.

  NASA has not yet issued a response to the issue.


youtube-dl http://www.youtube.com/watch?v=0SQFhJ7umFo -F
--->> 20200307@16:17:41 <<---
[youtube] 0SQFhJ7umFo: Downloading webpage
[youtube] 0SQFhJ7umFo: Downloading video info webpage
WARNING: video doesn't have subtitles
[info] Available formats for 0SQFhJ7umFo:
format code  extension  resolution note
249  webm   audio only tiny   56k , opus @ 50k (48000Hz), 1.08MiB
250  webm   audio only tiny   74k , opus @ 70k (48000Hz), 1.42MiB
140  m4aaudio only tiny  130k , m4a_dash container, 
mp4a.40.2@128k (44100Hz), 2.66MiB
251  webm   audio only tiny  147k , opus @160k (48000Hz), 2.81MiB
160  mp4256x144144p   80k , avc1.4d400c, 30fps, video only, 
1015.07KiB
278  webm   256x144144p   98k , webm container, vp9, 30fps, 
video only, 1.73MiB
242  webm   426x240240p  129k , vp9, 30fps, video only, 1.47MiB
133  mp4426x240240p  151k , avc1.4d4015, 30fps, video only, 
1.84MiB
243  webm   640x360360p  250k , vp9, 30fps, video only, 2.71MiB
134  mp4640x360360p  394k , avc1.4d401e, 30fps, video only, 
4.65MiB
244  webm   854x480480p  426k , vp9, 30fps, video only, 4.40MiB
135  mp4854x480480p  739k , avc1.4d401f, 30fps, video only, 
8.68MiB
247  webm   1280x720   720p  800k , vp9, 30fps, video only, 8.15MiB
136  mp41280x720   720p 1042k , avc1.4d401f, 30fps, video only, 
14.08MiB
248  webm   1920x1080  1080p 1632k , vp9, 30fps, video only, 
20.48MiB
137  mp41920x1080  1080p 1931k , avc1.640028, 30fps, video 
only, 24.51MiB
18   mp4640x360360p  489k , avc1.42001E, mp4a.40.2@ 96k 
(44100Hz), 10.04MiB
22   mp41280x720   720p  815k , avc1.64001F, mp4a.40.2@192k 
(44100Hz) (best)

youtube-dl http://www.youtube.com/watch?v=0SQFhJ7umFo -f248+251



Re: America is the greatest empire to grace the face of the Earth

2020-03-06 Thread Cecilia Tanaka
On Fri, Mar 6, 2020, 19:20 Ryan Carboni  wrote:

America is the greatest empire to grace the face of the Earth.
>

I think you mean "to DISgrace".  Are you taking medicines?  Already did you
try to talk with therapists and/or psychiatrists about your problems,
Ryan?  Depression changes a lot the real perception of everything.

Sincerely?  I will never try to summon you in front a mirror again.  I
hated the experience.  You can go away again and, please, just return when
your ghost learn more about History and Geography.

Take lots and lots of - mental? - care and be happy!  <3

>


Re: Geokeys for private key recovery

2020-03-06 Thread Razer
So no one need to look and see what "cypherpunks Digest, Vol 81, Issue
14 (was :> ... about.

On 3/6/20 4:48 PM, Philipp Angele wrote:
> True. "Pure" randomness will always be preferred to provide a maximum
> security.
> If you need a key that you feel could keep your data encrypted for 50
> years, geokeys would not be a good choice.
> However if it is short term use like with bitcoin you can do a trade
> of between level of key security and risk of losing the key.
> You would not have to make sure the encryption lasts for 50 years but
> only as long as you want to keep this key.
>
>> Am 06.03.2020 um 14:17 schrieb cypherpunks-requ...@lists.cpunks.org
>> :
>>
>>
>> Even though it would be hard to guess a secret key, this technique
>> reduces the security provided by a secret key made of pure random bits.
>> true?
>>
>>> Please try the POC and share your
>>> thoughts: https://github.com/oscar-davids/geokeytool
>>>
>>> Geokeys for Bitcoin and Ether and other killer apps like pgp, ssh
>



signature.asc
Description: OpenPGP digital signature


WhatsApp security flaw: 1000s of links to groups incl. 'Closed Groups' easily found

2020-03-06 Thread Razer
"A DW journalist recently discovered WhatsApp links that lead to closed
groups could be found with a simple Google search."


"WhatsApp links that lead to closed groups can be found with a simple
Google search — a major security flaw revealed by DW last week (link).
Following social media outrage, the links were removed from Google’s
search results.

Despite the removal, however, publicly-available internet archives are
still storing the information, as security researcher Lav Kumar has
found out. He gathered and organized over 60,000 unique links, which can
still be found on multiple websites.

Of the 1,000 randomly selected links DW tested, 427 were active chat
links. Even without actively joining a group, its title, description,
image and creator's phone number are available for all. However, upon
entering a group, it is possible to also see the phone numbers of up to
256 participants, as well as other information, and adding these numbers
to one's contacts can reveal their names in the app.

"We show all numbers in groups for people's safety that way they know
who will receive their messages," WhatsApp told DW in response.

Real-life danger

Using this information, DW gained access to a group described as
"Ministry of finance civil servants" in Indonesia, revealing the phone
numbers of all 14 members. Several other groups appeared to be official
support groups for the campaign of Brazilian President Jair Bolsonaro.

Among the 427 active links DW examined, there were groups described to
be for school classes, medical trainees, political campaigns,
businesses, pornography and sex workers. Some groups included members
with particularly sensitive identities, such as one chat with hundreds
of members clearly labeled as an LGBTQ+ group in a Latin American
country with high rates of homophobic murders.

In some cases, the group image looked like amateur pornography or had
titles such as "ex-wives leaked videos," raising questions of consent.
(screenshot)"

Also listed were potential terrorist groups and groups advertised as for
sharing footage of "extreme" sexual content, including rape. A small
number indicated that they were for child pornography.

WhatsApp told DW that the company has a zero-tolerance policy around
child sexual abuse and bans users immediately if they are found sharing
content that exploits or endangers children.

The platform also claims to ban approximately 250,000 accounts each
month suspected of sharing exploitative images of children and relies on
user reports and all unencrypted information to do so.

'Useful for terrorism chats'

In response to the revelations, some Twitter users pointed out that this
information could be used by authorities to track down illegal content
without WhatsApp offering an official "backdoor" to encrypted content.

"Of course there is a possibility that they left it open to search for
problem groups," Jake Moore, a cybersecurity specialist and former Head
of Digital Forensics at a British police force, told DW, "they aren’t
always too keen to help law enforcement, so might have found it
beneficial to offer it out to law enforcement and not openly mention it."

On whether law enforcement would use this proactively to identify crime,
Moore said: "Most police forces aren’t that proactive, [but] rather
reactive. However, I would imagine it would be useful for terrorism
chats, yet I doubt they use WhatsApp."

However, investigations into far-right terrorism in Germany show that
organizations have used Whatsapp to introduce members to each other.

Read more: German far-right extremists met on WhatsApp, planned mosque
attacks"

More links:
https://www.dw.com/en/whatsapp-security-flaw-over-6-groups-still-accessible-online/a-52543414




signature.asc
Description: OpenPGP digital signature


Re: cypherpunks Digest, Vol 81, Issue 14

2020-03-06 Thread Philipp Angele
True. "Pure" randomness will always be preferred to provide a maximum security.
If you need a key that you feel could keep your data encrypted for 50 years, 
geokeys would not be a good choice.
However if it is short term use like with bitcoin you can do a trade of between 
level of key security and risk of losing the key.
You would not have to make sure the encryption lasts for 50 years but only as 
long as you want to keep this key.

> Am 06.03.2020 um 14:17 schrieb cypherpunks-requ...@lists.cpunks.org:
> 
> 
> Even though it would be hard to guess a secret key, this technique reduces 
> the security provided by a secret key made of pure random bits.
> true?
> 
>> Please try the POC and share your thoughts: 
>> https://github.com/oscar-davids/geokeytool 
>> 
>> 
>> Geokeys for Bitcoin and Ether and other killer apps like pgp, ssh



signature.asc
Description: Message signed with OpenPGP


Re: The Verge: A major new Intel processor flaw could defeat encryption and DRM protections

2020-03-06 Thread grarpamp
https://en.wikipedia.org/wiki/Pentium_FDIV_bug

Intel has had 1 or 2 other cpu replacement programs,
that were much more quiet limited to select/affected
customers. Rumor has it you could bitch about TSX-NI
and get one too.


War on Crypto: EARN-IT Act to Destroy End-to-End Crypto, Establish Internet Overlords, Kill Free and Private Speech

2020-03-06 Thread grarpamp
https://act.eff.org/action/protect-our-speech-and-security-online-reject-the-graham-blumenthal-proposal
https://www.eff.org/deeplinks/2020/01/congress-must-stop-graham-blumenthal-anti-security-bill

https://www.privateinternetaccess.com/blog/2020/02/the-earn-it-act-is-the-latest-clueless-attack-on-encryption-do-not-fall-for-it/
https://www.wired.com/story/earn-it-act-sneak-attack-on-encryption/
https://arstechnica.com/tech-policy/2020/03/proposed-us-law-is-trojan-horse-to-stop-online-encryption-critics-say/
https://reason.com/2020/01/31/lindsey-graham-wants-to-use-mistrust-of-big-tech-to-destroy-your-right-to-online-privacy/
https://libertarianhub.com/2020/01/31/congress-must-stop-the-graham-blumenthal-anti-security-bill/
https://www.wsws.org/en/articles/2020/02/08/encr-f08.html
https://cyberlaw.stanford.edu/blog/2020/01/earn-it-act-how-ban-end-end-encryption-without-actually-banning-it
https://gizmodo.com/lindsey-graham-is-quietly-preparing-a-mess-of-a-bill-tr-1841394208
https://cyberlaw.stanford.edu/blog/2020/01/earn-it-act-how-ban-end-end-encryption-without-actually-banning-it
https://www.lawfareblog.com/earn-it-act-raises-good-questions-about-end-end-encryption
https://www.missingkids.org/blog/2019/post-update/end-to-end-encryption
https://www.missingkids.org/blog/2020/earn-it-act-2020
https://www.judiciary.senate.gov/press/rep/releases/graham-blumenthal-hawley-feinstein-introduce-earn-it-act-to-encourage-tech-industry-to-take-online-child-sexual-exploitation-seriously
https://www.justice.gov/opa/pr/department-justice-hold-workshop-section-230-communications-decency-act
https://www.insurancejournal.com/news/national/2019/07/10/531688.htm
https://blog.ericgoldman.org/archives/2020/02/the-earn-it-act-is-another-terrible-proposal-to-reform-section-230.htm
https://blog.cryptographyengineering.com/2020/03/06/earn-it-is-an-attack-on-encryption/
https://netchoice.org/netchoice-announces-opposition-to-sen-grahams-earn-it-act/
https://www.newamerica.org/oti/press-releases/oti-strongly-opposes-earn-it-act-threatens-encryption-and-constitutional-rights/
https://old.reddit.com/r/Libertarian/comments/f015qn/holding_section_230_hostage_lindsey_graham/
https://old.reddit.com/r/technology/comments/f0g6g9/holding_section_230_hostage_sen_graham_demands/
https://www.schneier.com/blog/archives/2019/12/reforming_cda_2.html
https://www.schneier.com/blog/archives/2019/01/alex_stamos_on_.html
https://www.schneier.com/blog/archives/2019/12/scaring_people_.html
https://www.theverge.com/2020/1/31/21116788/earn-it-act-section-230-lindsey-graham-draft-bill-encryption
https://www.theverge.com/2020/3/5/21162983/congress-senate-earn-it-act-lindsey-graham-richard-blumenthal-section-230-encryption-bill-proposed
https://www.cato.org/blog/holding-230-hostage-sen-graham-demands-platforms-earn-it
https://www.techdirt.com/articles/20200131/11252343832/lindsey-grahams-sneak-attack-section-230-encryption-backdoor-to-backdoor.shtml
https://www.engadget.com/2020/01/31/earn-it-act-bill-would-limit-encryption/
https://cdt.org/insights/privacy-free-expression-and-security-threatened-by-graham-proposal/
https://cdt.org/press/earn-it-act-threatens-encryption-free-expression-and-prosecutions-of-child-exploitation/
https://news.ycombinator.com/item?id=22505302

"The argument from those in power against encryption is mind-bogglingly
stupid, and I don't know if it is due to an extreme ignorance, or
because of a lust for the power and leverage that mass surveillance
grants a governing entity, I suppose it could be both"

"Sounds more like an end-run on the US Constitution. There isn't
any difference in my mind between the government executing
unconstitutional searches and the government requiring companies
to conduct searches that if conducted by the government would be
unconstitutional. Warrant-less searches by the federal government
are unconstitutional; getting a warrant requires having probable
cause. Without probable cause and a warrant, requiring a company
to conduct searches on behalf of the government is unconstitutional
as well."

"Yes. That's what end-to-end encryption is, a new language that
only those two systems know how to speak. I'll be the asshat marked
troll for saying this too, but sorry kids. Child exploitation is a
scourge on our society, but stopping isn't isn't worth the price
of losing our rights to privacy to talk amongst each other. It's
just not. There. Said it. The ends don't justify the means in this
case. We can't end every freedom we've fought for in the name of
ending child exploitation."

"This is about controlling the rest of us. Criminals, as we and the
government know, are perfectly capable of using strong encryption.
I've seen over and over these weak excuses, these pathetic fig
leaves Congress-critters use. They don't provide them because they
believe them or because the goats will accept them. They provide
them for the purposes of the propaganda, the fodder they and they
owned media put out for the sheep."

"It's 

America is the greatest empire to grace the face of the Earth

2020-03-06 Thread Ryan Carboni
America is the greatest empire to grace the face of the Earth.

If there is evidence to the contrary, it ought to be ignored.

The idea that it is a laughing matter that a senile buffoon might be
the Democratic nominee is somewhat baffling considering criticisms of
Trump. But no one really made arguments on principle, it is just to
dunk on the other side.

There are benefits to being the greatest empire, when Americans say
America, people know they aren't referring to the continent, when
Americans are wronged, our government redresses their concerns, when
we travel abroad, everyone accepts American cash. We attract the
greatest thinkers, the greatest doers, because that is America.

Of course there will always be cliques of people who will think others
are gross and rather not deal fairly with them, but prevailing
circumstances will always dictate concerns.

Wish the Spanish acronym for the US wasn't EE UU but EUA, but
whatever, I'd don't speak it.

https://nitter.net/matthewstoller/status/1235717812699594753#m
Democratic insiders know Biden has cognitive decline issues. They joke
about it. They don’t care.


Re: The Verge: A major new Intel processor flaw could defeat encryption and DRM protections

2020-03-06 Thread Razer



On March 6, 2020 10:06:50 AM PST, jim bell  wrote:
>The Verge: A major new Intel processor flaw could defeat encryption and
>DRM protections.
>https://www.theverge.com/2020/3/6/21167782/intel-processor-flaw-root-of-trust-csme-security-vulnerability

It was a floating point error in the math if I remember correctly. Something 
about the way it rounded off large numbers
Rr
Sent from my Androgyne dee-vice

Fuck you if you don't care for my 'brevity'.


Schulte Trial Update

2020-03-06 Thread John Young
Joshua Schulte trial jury "aligned on two counts," impasse on 
remaining eight counts, may be considered a loss for the prosecution, 
to continue on Monday.


Via http://www.innercitypress.com/sdnylive26schulte030620.html




Re: The Verge: A major new Intel processor flaw could defeat encryption and DRM protections

2020-03-06 Thread jim bell
 I am reminded of about 1992, when the 486 Intel microprocessor was discovered 
to have a rather serious flaw in its arithmetic unit, with potential errors in 
the 4th and even the 3rd digit.  Intel ended up replacing those CPU's.  I 
wonder if they will do the same thing this time.This particular article 
https://www.nytimes.com/1994/11/24/business/company-news-flaw-undermines-accuracy-of-pentium-chips.html
mentions the Pentium and 1994, but I believe that the 486 had a similar 
problem.  But I am unable to find reference to it.  
Also: https://www.cs.earlham.edu/~dusko/cs63/fdiv.html
https://www.computerworld.com/article/2515483/epic-failures-11-infamous-software-bugs.html?page=3

http://www.vcfed.org/forum/archive/index.php/t-17799.html 


             Jim Bell


On Friday, March 6, 2020, 10:07:13 AM PST, jim bell  
wrote:  
 
 The Verge: A major new Intel processor flaw could defeat encryption and DRM 
protections.
https://www.theverge.com/2020/3/6/21167782/intel-processor-flaw-root-of-trust-csme-security-vulnerability

  

The Verge: A major new Intel processor flaw could defeat encryption and DRM protections

2020-03-06 Thread jim bell
The Verge: A major new Intel processor flaw could defeat encryption and DRM 
protections.
https://www.theverge.com/2020/3/6/21167782/intel-processor-flaw-root-of-trust-csme-security-vulnerability



Sorry for calling you old Jim

2020-03-06 Thread rooty
Hi Jim I wanted to apologise for calling you old. At 81 years young Viagra has 
given new life -

Your friend rooty

Re: Geokeys for private key recovery

2020-03-06 Thread other.arkitech
‐‐‐ Original Message ‐‐‐
On Thursday, March 5, 2020 10:57 PM, Philipp Angele  
wrote:

> I created this alternative for seed phrases that allow you to memorize, 
> verbally transfer and recover a private ECDSA key for Bitcoin and Ethereum.

Even though it would be hard to guess a secret key, this technique reduces the 
security provided by a secret key made of pure random bits.
true?

> Please try the POC and share your thoughts: 
> https://github.com/oscar-davids/geokeytool
>
> Geokeys for Bitcoin and Ether and other killer apps like pgp, ssh
>
> Introduction
>
> Today it is hard for anyone to recover a private key from memory. Brainkey 
> implementations usually require the user to memorize a set of words. Most 
> implementations want the user to remember a set of 12-24 words. While it is 
> possible to memorize those seed phrases it is also very likely to forget them 
> and highly unlikely that a user can quickly transfer them to another user 
> without revealing the secret to unwanted listeners. Other key recovery 
> methods have dependencies on either a trusted party or a decentralized 
> application. Those leave the user at risk of losing access to their keys by 
> either the trusted party removing your access or a bug in a dApp can lock 
> your access as well.
>
> In this paper, we propose a private key recovery system that allows people to 
> remember/recover it without any accessories or aids. The system needs just a 
> location and a password to recover a key. We prove that neither the key nor 
> the encryption are weakened by this system. The simplicity of the 
> implementation allows us to get rid of:
>
> -
>
> a middleman
>
> -
>
> a smart contract
>
> -
>
> a centralized recovery system
>
> -
>
> an online connection
>
> As we will see further below, this empowers users to:
>
> -
>
> create and memorize a key with very low chances of forgetting it
>
> -
>
> quickly transfer a key verbally to another person
>
> -
>
> recover their key at a low cost
>
> all without revealing the entropy in clear text.
>
> Abstract
>
> This paper proposes a key recovery method that uses a known and a partially 
> known secret that forces the recovery to use a brute force mechanism to get 
> to the full secret of the partial secret and that validates the results with 
> the existence of the key on a blockchain, ledger, database... .
>
> A ECDSA or other cryptographic key pair might be built using one or many 
> known secrets and one or many partially known secrets. Once this key has 
> interacted with a blockchain, ledger... it is possible to recover it by 
> creating all possible keys with the known and the partial known secret(s) by 
> guessing the missing part(s) of the partial secret(s). To identify which was 
> the original key to recover all created keys need to be looked up on a 
> blockchain or ledger as only the one which has interacted with it will be 
> traceable there.
>
> Working principle
>
> A user generating a private key picks a precise location from a map and a 
> password.
>
> A key generator uses the password and the location's geo coordinates as salt 
> and digests everything with a high computational cost (in our PoC BCrypt) to 
> create a ECDSA key-pair. The precision of the geo location needs to be known 
> down to a meter level but the key generator will add a random and unknown 
> decimal degree up to 1 millimeter depending on the targeted security of the 
> key.
>
> As we will see, we generate entropy by having every square centimeter on 
> Earth in combination with an infinite number of possible passwords.
>
> To recover the key the user will have to brute force all coordinates around 
> the location on a scale of square meters with the known password. The 
> location is quite vague since the user never knew which centimeter he chose 
> from the map when he generated the key but only roughly the position. He will 
> have to try through all possible square centimeter around the location he 
> set. This will take a bit of time to recover the key but the chance for the 
> user who knows the location and the password is high. For state of the art 
> technology this will be on the scale of 1 computational day or 1$. For an 
> attacker, the chance to guess both location and password is negligible. Even 
> for a known password and an approximate guess of the location (i.e. to know 
> which city) does not significantly speed up the brute force process.
>
> Since every generated key is valid, both the attacker and the user have to 
> check all created keys to have a balance on the blockchain in order to 
> identify the one they wanted to recover.
>
> Conjecture
>
> Emotions are the best incorporeal storage in meatspace.
>
> The emotional connection to locations make them an easy thing to remember. 
> One can transfer the key easily to someone without revealing the information 
> in clear text and thus without reducing the entropy. An example: "The place 
> where we kissed the first 

Re: Coronavirus: Thread

2020-03-06 Thread grarpamp
today: 100k cases, 3.4k dead another 2.3k to go
bet1: 500k 25k in ~5 months
bet2: 1m 50k in <=~1y?
bet3: ?