User Controls

Lanny_loves = faggots

  1. #81
    RisiR † 29 Autism
    Hey gadzy, have you ever clicked on the "fork me hard" link at the bottom of the page?

    Maybe it's something you can OCD about.
    The following users say it would be alright if the author of this post didn't die in a fire!
  2. #82
    gadzooks Dark Matter [keratinize my mild-tasting blossoming]
    Originally posted by RisiR † Hey gadzy, have you ever clicked on the "fork me hard" link at the bottom of the page?

    Maybe it's something you can OCD about.

    I have definitely snooped through the ISS code repo quite a bit.

    I discovered a few really interesting things, but mostly just stuff that's common knowledge by now for most NIS users.

    I even think it might have been you, RisiR, that taught me about tripphrases, for example.
  3. #83
    gadzooks Dark Matter [keratinize my mild-tasting blossoming]
    Oh man, and when I found the BBCode for VIBRATING TEXT ... That was awesome.
  4. #84
    D4NG0 motherfucker
    dish. i want a vibrator too
  5. #85
    gadzooks Dark Matter [keratinize my mild-tasting blossoming]
    Also, I wrote some code to automatically post every x MILLISECONDS (since there seems to be no flood control), and the script modifies each post in a way indistinguishable to the reader, so it bypasses any errors about posting the same thing repeatedly.

    BUT, I respect Lanny's rules, and so whether I'm making GET or POST requests to NIS, I abide by the 4 requests per second mentioned in the somewhere... robots.txt? humans.txt? somewhere.

    And even then, I don't take it to the extremes I could, even within those boundaries, if I wanted to...
  6. #86
    gadzooks Dark Matter [keratinize my mild-tasting blossoming]
    Originally posted by D4NG0 dish. i want a vibrator too

    I don't know how much of a "public secret" it is, or what Lanny's stance is on sharing it... But I could definitely see it becoming overused overtime.

    But I'll PM you how to do it.
  7. #87
    GGG victim of incest [my veinlike two-fold aepyornidae]
    I PROMISE I WILL NEVER ABUSE THIS
  8. #88
    gadzooks Dark Matter [keratinize my mild-tasting blossoming]
    I could give myself a 14,000 post count in under an hour, for example.

    I would set it up to post to one single thread in the Mongolvoid (although first I'd test to see if those even add to post count), to cause as little disruption as possible.

    But, technically, it could be done.
  9. #89
    gadzooks Dark Matter [keratinize my mild-tasting blossoming]
    Originally posted by GGG I PROMISE I WILL NEVER ABUSE THIS

    What the fuck did you just fucking say about me, you little bitch? I'll have you know I graduated top of my class in the Navy Seals, and I've been involved in numerous secret raids on Al-Quaeda, and I have over 300 confirmed kills. I am trained in gorilla warfare and I'm the top sniper in the entire US armed forces. You are nothing to me but just another target. I will wipe you the fuck out with precision the likes of which has never been seen before on this Earth, mark my fucking words. You think you can get away with saying that shit to me over the Internet? Think again, fucker. As we speak I am contacting my secret network of spies across the USA and your IP is being traced right now so you better prepare for the storm, maggot. The storm that wipes out the pathetic little thing you call your life. You're fucking dead, kid. I can be anywhere, anytime, and I can kill you in over seven hundred ways, and that's just with my bare hands. Not only am I extensively trained in unarmed combat, but I have access to the entire arsenal of the United States Marine Corps and I will use it to its full extent to wipe your miserable ass off the face of the continent, you little shit. If only you could have known what unholy retribution your little "clever" comment was about to bring down upon you, maybe you would have held your fucking tongue. But you couldn't, you didn't, and now you're paying the price, you goddamn idiot. I will shit fury all over you and you will drown in it. You're fucking dead, kiddo.
    The following users say it would be alright if the author of this post didn't die in a fire!
  10. #90
    GGG victim of incest [my veinlike two-fold aepyornidae]
    That may be the best thing I've seen on this website.
    The following users say it would be alright if the author of this post didn't die in a fire!
  11. #91
    GGG victim of incest [my veinlike two-fold aepyornidae]
    It may be the only thing I've seen on this website.
  12. #92
    gadzooks Dark Matter [keratinize my mild-tasting blossoming]
    Originally posted by GGG That may be the best thing I've seen on this website.

    I used some python scripting to randomly choose colors, and to bold all letters, and to intermittently sub and sup every other word.

    So next time someone tells you Python is useless, tell them that you can accomplish the above effect with a few lines of code.

    If that isn't the practical application of an endlessly useful resource towards something meaningful and world-impacting, then I just don't what is.
  13. #93
    aldra JIDF Controlled Opposition
    Originally posted by Lanny also learn a lisp, or at least perl you limp wristed pseudo-programmers.

    someday I'll pick up assembler again

    Originally posted by -SpectraL -snip-

    Formatted:


    I wrote up how it works a long time ago but I can't find it so I assume it was on another site.

    Tips:

    - carat (^) in javascript is XOR. as a result, the raw pw ('default') is not the cipher, it is the value of each character in pw XOR'd by it's corresponding character in t.
    for(i=0;i<pw.length;i++) c=c^t.indexOf(pw.charAt(i));

    - hex values are denoted and automatically parsed. \00 or \x00 inside a string is parsed as a null character. string = '\00\00\00' fills string with 3 nulls. info. this means that each of the escapes in the variable t maps to a single (usually unprintable) character.

    answer
    The following users say it would be alright if the author of this post didn't die in a fire!
  14. #94
    gadzooks Dark Matter [keratinize my mild-tasting blossoming]
    Originally posted by aldra I wrote up how it works a long time ago but I can't find it so I assume it was on another site.

    Tips:

    - carat (^) in javascript is XOR. as a result, the raw pw ('default') is not the cipher, it is the value of each character in pw XOR'd by it's corresponding character in t.
    for(i=0;i<pw.length;i++) c=c^t.indexOf(pw.charAt(i));

    - hex values are denoted and automatically parsed. \00 or \x00 inside a string is parsed as a null character. string = '\00\00\00' fills string with 3 nulls. info. this means that each of the escapes in the variable t maps to a single (usually unprintable) character.

    answer

    I was pretty damn close, though, you gotta admit.

    I would have kept at it too, if it weren't for those meddling kids.

    But for real though, I would have eventually gotten there.

    Aldra, do you know much about one-way hash functions - specifically, sponge functions?

    I mentioned earlier in the thread I really want someone to explain to me, in simple, intuitive, even analogical terms (if necessary), how sponge functions work...

    In fact, how does any one-way hash function work? How do you guarantee an output string of N characters every single time?
  15. #95
    gadzooks Dark Matter [keratinize my mild-tasting blossoming]
    Like Keccak, I tried deconstructing it and rebuilding it from scratch (that's pretty much my go to method for learning computer science / programming stuff), but there are a LOT of bit shifting operations, and like... how the fuck do they decide on these particular values to bitshift by? I just don't get it.

    Cryptography is not my strong suit.
  16. #96
    GGG victim of incest [my veinlike two-fold aepyornidae]
    I can't wait until this stops sounding like a completely different fucking language to me.
  17. #97
    gadzooks Dark Matter [keratinize my mild-tasting blossoming]
    Originally posted by GGG I can't wait until this stops sounding like a completely different fucking language to me.

    Ok, things like sponge functions and all that are pretty advanced topics. It's not the kind of stuff you learn right out the gate.

    Heck, I've known people with a bachelors in CS who couldn't tell you much about HOW things like sponge functions really work under the hood.

    I've worked with people with many years of experience on me as developers that had no idea.

    Computer science, just like any branch of science or field of inquiry, can have its obscure areas.

    Sponge functions are probably one of them.

    But what's fascinating about sponge functions and their ilk is that they are what blockchain is typically built upon (especially Ethereum).

    I work with various implementations of blockchain technology for work, so that's why I have some degree of interest in one-way hashing algorithms and sponge functions and all that.
  18. #98
    aldra JIDF Controlled Opposition
    Originally posted by gadzooks Like Keccak, I tried deconstructing it and rebuilding it from scratch (that's pretty much my go to method for learning computer science / programming stuff), but there are a LOT of bit shifting operations, and like… how the fuck do they decide on these particular values to bitshift by? I just don't get it.

    Cryptography is not my strong suit.

    Choosing those specific functions is mostly a matter of coming up with an algorithm that's 'mathematically strong', then finding a way to convert it to code efficiently. You're thinking of it purely in terms of the code - it's very difficult to understand the 'why' just from that.

    Keccak looks like a complicated place to start; have a look into CRC algorithms (about the simplest kinds of one-way hashes) and then older functions like MD5.
    The following users say it would be alright if the author of this post didn't die in a fire!
  19. #99
    gadzooks Dark Matter [keratinize my mild-tasting blossoming]
    Originally posted by aldra Choosing those specific functions is mostly a matter of coming up with an algorithm that's 'mathematically strong', then finding a way to convert it to code efficiently. You're thinking of it purely in terms of the code - it's very difficult to understand the 'why' just from that.

    Keccak looks like a complicated place to start; have a look into CRC algorithms (about the simplest kinds of one-way hashes) and then older functions like MD5.

    Ok yeah, MD5 I kinda get.

    I was able to recreate that in Python from scratch, I think.

    I'm not too familiar with CRC though.

    But I will definitely check them out.

    But I ended up reading the Ethereum yellow paper, and it just sent me down so many different rabbit holes.

    Keccak / Sha / sponge functions were one such rabbit hole.

    Like I get the idea of how Merkle trees work and all that, I've built some from scratch to learn more about them.

    But the mathematical algorithms they choose, and how they choose them, I just need to know more about that. It's super fascinating to me.
  20. gadzooks Dark Matter [keratinize my mild-tasting blossoming]
    Actually, I have to come clean, now that I think of it, I never wrote MD5 from scratch.

    I just remember reading some MD5 algorithm code though and it kinda made more sense to me than, say, Keccak.

    But I found an example of Keccak implemented in Python and just started annotating every line of it to explain to myself how it works.

    But it is a long, convoluted sequence of bitshifting though.
Jump to Top