reifyx | 1 year ago | on: Ask HN: Where are all the touch-based art forms?
reifyx's comments
reifyx | 2 years ago | on: I Know What Your Password Was Last Summer
reifyx | 3 years ago | on: Just don’t
reifyx | 3 years ago | on: Pyinfra automates infrastructure super fast at scale
Only downside is I couldn't make it work with my SSH agent, but that might be a problem with Paramiko and not Pyinfra.
reifyx | 3 years ago | on: An Intuition for Lisp Syntax (2020)
>Now, if we agree that the ability to manipulate source code is important to us, what kind of languages are most conducive for supporting it?
This is useful for compiler programmers, or maybe also those writing source code analyzers/optimizers, but is that it? On occasion I have had to write DSLs for the user input, but in these cases the (non-programmer) users didn't want to write Lisp so I used something like Haskell's parsec to parse the data.
The remote code example given in the post is compelling, but again seems a bit niche. I don't doubt that it's sometimes useful but is it reason enough to choose the language? Are there examples of real-life (non-compilers-related) Lisp programs that show the power of homoiconicity?
Same goes with the concept of "being a guest" in the programming language. I have never wanted to change "constant" to "c". Probably I'm not imaginative enough, but this has never really been an issue for me. Perhaps it secretly has though, and some of my problems have been "being a guest" in disguise.
reifyx | 3 years ago | on: Show HN: Brevity 500 – Short games to help you become a powerful writer
Both in technical and creative writing, I agree that the main issue I've seen is unnecessary filler words, needlessly complicated sentences, and a difficulty clearly expressing the point and staying on-topic.
Some ideas - A copy of the original text with highlighted words above the editor might be nice - Not sure if the timer is helpful, might cause people to do a poor job for fear of running out of time. Could start without a timer and add it in as users get more practice
reifyx | 4 years ago | on: GPG-Tui, a Terminal User Interface for GnuPG
reifyx | 4 years ago | on: GPG-Tui, a Terminal User Interface for GnuPG
Agreed.
>Lack of forward secrecy implies, logically, that if your long-term secret is ever compromised, every message you've ever sent is recoverable from the adversary's archive.
Also agreed. I am trying to say that this only gives you better security for messages that you have deleted on your device, because if you haven't, regardless of whether your protocol is forward-secret or not, the adversary that has the power to compromise your device will get access to the message the plaintext of which is on the device, even if the keys aren't. Thus, the scope is significantly limited, unless you have a policy to regularly delete old messages on your device, and most people do not want this for email.
I can assure you I understand the cryptographic properties of forward secrecy. I don't understand your claim that it is a strict requirement for every secure messaging system, including an email-like usecase.
>I'm sometimes in the mood to write long posts and comments explaining this stuff, but today, on the bottom of this old thread, if you're trying to make a point about PGP vs. Signal...
I already said several times I don't care about PGP. I feel like you're not really reading or responding to any of my arguments about why forward secrecy doesn't really help you much in most users' threat models or why it precludes various desirable features (of course, I could be wrong here, which is what I'm asking about). Thanks for your time anyway.
reifyx | 4 years ago | on: GPG-Tui, a Terminal User Interface for GnuPG
I'm not trying to be argumentative here, I actually don't understand what the reason it's so critical is, nor have I really found any explanations online. For text messaging where you don't really go back to read your old messages, sure, forward secrecy makes sense. Email seems to be a different story where user expectation is different and forward secrecy both precludes many desired features and also doesn't provide significantly more security, other than in very limited circumstances.
Also, I'm not an advocate of PGP at all. If people can use Signal for their usecase, great! They should do that. But Signal's model does not work for everyone's usecases. How do I send a Signal message to [email protected] to report a vulnerability? Is the entire security team supposed to share a mobile phone with Signal on it? What about banks that need to send secure email to each other, but must retain all messages for compliance purposes? (Again, I'm not advocating that PGP should be used in this scenario either, just that there's room for a better solution here, possibly without forward secrecy by default).
reifyx | 4 years ago | on: GPG-Tui, a Terminal User Interface for GnuPG
Just thinking, if people had the option between 1) deleting their mail and 2) email search, secure (unlike WhatsApp) and easy (unlike Signal) backups, ability to offload your email archive to the server (it's common to have gigabytes of mail, do you want to store all of it on a mobile phone forever? what happens if you drop it in a river?), and so on, don't you think people would go for option 2?
This is all disregarding the specifics of PGP-encrypted mail, for which I agree is not great.
reifyx | 4 years ago | on: GPG-Tui, a Terminal User Interface for GnuPG
Post-compromise security, on the other hand, makes more sense, since the future messages don't exist yet.
reifyx | 4 years ago | on: GPG-Tui, a Terminal User Interface for GnuPG
reifyx | 4 years ago | on: “Computer science is not about computers”
reifyx | 4 years ago | on: GPG-Tui, a Terminal User Interface for GnuPG
Also, how would it work with multiple people in a thread that can be added/removed arbitrarily, or email addresses that resolve to multiple users? Messaging and email seem like different models to begin with.
reifyx | 7 years ago | on: Bruno Buchberger’s algorithm: Gröbner bases and applications (1998) [pdf]
Still curious about the Trithemius quote and if it has any particular relevance to the paper.
reifyx | 7 years ago | on: Bruno Buchberger’s algorithm: Gröbner bases and applications (1998) [pdf]
[https://pdfs.semanticscholar.org/aab4/9f22ed522d16111eca29ae...]
Not only is this paper written in a very wry style not super common in math papers (it is addressed to "Dear Deluded Author"), it seems all the authors are pseudonyms: Boo Barkee, Deh Cac Can, Julia Ecks, Theo Moriarty, and R.F. Ree. And it includes a large quote from Trithemius' (a 15th century occultist who wrote several books on magic that were actually "encrypted" books on early cryptography in disguise.) Steganographia in the abstract.
When I tried to do some research on this mysterious paper I couldn't really find any references or explanations for who these people are, where they are from, or why this wrote this paper. The only thing I could come up with is "Boo Barkee" sounds a lot like "Bourbaki", the last name of a pseudonymous group of French mathematicians [https://en.wikipedia.org/wiki/Nicolas_Bourbaki].
All this to say, does anyone here know about this paper or who the authors are? Why is it all so mysterious? Is there supposed to be hidden steganography'd messages inside the paper itself? Are the other authors' names also references?
As for my final project, I ended up not being able to figure out a way to use Grobner bases for cryptography.