| Deutsch English Français Italiano |
|
<1053pcn$3jp8p$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: nntp.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> Newsgroups: sci.crypt Subject: Re: AI's take on my cipher... Date: Mon, 14 Jul 2025 13:30:15 -0700 Organization: A noiseless patient Spider Lines: 46 Message-ID: <1053pcn$3jp8p$1@dont-email.me> References: <1049c0q$10d0c$1@dont-email.me> <104mgv5$cvfq$1@dont-email.me> <047c88f47daa342fbbf7aee669a3deb8896ce6af@i2pn2.org> <104mj60$dltj$1@dont-email.me> <4b6e233e7c3fb669fa324151f627c4addbfc9f70@i2pn2.org> <104r7eo$1i08p$1@dont-email.me> <95a6f265f6bdddcd037a7e48cf5258e77cec9b15@i2pn2.org> <104uecv$2ak1k$1@dont-email.me> <8e54a93978459bb7baa6896adc62508b9deb7d78@i2pn2.org> <104uqme$2cu71$1@dont-email.me> <1050ffb$2q09e$2@dont-email.me> <da6f83987b8b26ab31d7548607aaa6529a7a0f06@i2pn2.org> <10536me$3fgpt$1@dont-email.me> <49d6be48c0d398c0f4e4f95d0566ff9a98e94353@i2pn2.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Mon, 14 Jul 2025 22:30:16 +0200 (CEST) Injection-Info: dont-email.me; posting-host="355a90c20167c748a54020f69c579dec"; logging-data="3794201"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+ZappOWFOihAcB/yXSkqWMPYqVdq3uVa4=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:c6O99+aoOlL3U5/PdDd/QCwJkic= In-Reply-To: <49d6be48c0d398c0f4e4f95d0566ff9a98e94353@i2pn2.org> Content-Language: en-US On 7/14/2025 9:15 AM, Stefan Claas wrote: > Rich wrote: >> Stefan Claas <stefan@mailchuck.com> wrote: >>> Rich wrote: >>> >>>> And, how accurately do you think the average person who wants to send >>>> an encrypted message will be at typing this: >>>> >>>> KqHtqbSca2hvI02pCMHtdKQLfHhW6OeN7iK1Fg45nMpoT+to8XpwpvARkW6UziY0iyZWUEgP/gol >>>> gz5p3XpGCe0hZbYV2IYYLDvvRjGWj1k5IHkDX4WshBZvI5fhVssJOqVI3bzqdEW3XLD4NoGKVQg3 >>>> ZeNaSJs2hBySnkBoKGI= >>>> >>>> That's 128 random bytes, base64 encoded. 128 bytes is right about the >>>> original "tweet length" of tweets on shitter, so there is a severe >>>> limit of the amount of information that can be transferred. >>> >>> That why I have my az and ug program for people available, but it uses 2 >>> bytes, which should be no problem. >>> >>> $ openssl rand 128 | az | ug -g >>> ZMAXT OPNWC LZWIF OQIMR PNNQV BFQLC BRZDA RUFBT ROLQS GOLKA >>> KKNJF ULBLO WINNL IIVVK FWTEE XRGBS UJCYS DCMWH JUMAA VLLNX >>> MJMYS LHSKG ENKLL LUGBN YNDSP AJYMO OXUBC YQNOY QMFYW ABOPH >>> NUVCJ KMFCM XKDVM EEXYL LVUKO VVGAU UACYV OHKUG GTVAA MWDLO >>> KCPYN HOWVM DPNHA ZMGHV MFIKW DILNO FYQHK VQELK OMFNL EOLTL >>> ETMPL S >> >> Yes, easier to enter than raw base64. But in this case this "easier" >> is like the fact that it is "easier" to move 10,000kg of sand 1km by >> hand than it is to move one single 10,000kg rock 1km by hand. "Easier?" Yes, >> but no one will actually want to do so either by hand if they have >> other alternatives. >> >> No one, except for the very very truly determined (a tiny sized >> population), will want to hand type that to maintain proper >> air-gapping. So they will use USB sticks or other methods to "move" >> the data, opening up the possibility of transfer of an exploit via that >> same USB stick. >> > > A 3.5 ich disk drive and disk for it come in handy, because you hear > every read/write process and can quickly examine the sectors with a > disk editor. Remember those 3.5 inch disks that had fuzzy bits? They do exist, but took special hardware to create.