questionable attitude

[chan3] general
Feb 17 20:54 [raw]

It is. But first - THINK about it. And your own, emotionally driven FRUSTRATION. And what you wish to achieve in communicating this to the community at large. Been there, myself, as a young man. I learned to control instant reaction and harness it, twist it to a more positive purpose. You succeeded - and found a workaround. Got what you wanted, eventually. Thank you for spending the time in the analysis of the keyspace: most sincerely. Its something I've posted about as an ancient cryptographer, analyst and coder all the way back to the earliest public key cryptosystems that were known just after the middle of last century. Perhaps reading some of that traffic on BM inspired you to spend your time in this endeavour. I wish you well with it; study and lookup the published papers in the field for the analysis. Your very best friend is the mark 1 Eyeball! In its simplest form a 2D graph splitting the entire keyspace into x + y - plot your million keys. See any "patterns" ? Millions of years of evolution finding camouflaged predators that may be lurking in the long grass sometimes get it wrong, but rarely miss that important genuine positive. Climb out of your tree with clear purpose and situational awareness. Dont wait until you fall out of it, of get pushed out. If you have a mind that can grasp multidimensions and "shadows" of mutating topologies try plotting beyond 3D. Please understand that this open code has a zillion opportunities to a seasoned attacker that sets out just to disrupt the entire network. Not TLAs - just the usual "useful idiots" that can be manipulated and provoked. THATS why its in there. There are probably MANY other "gamed" situations that a mindful coder who understands the protocol ans network weaknesses has already found in OTHER places. Where are they? Same applies. Get a grip Lad! Alternative approach : A humourous one. Thanking him for the message. Propose an equally humourous approach patch message and "Easter Egg" style code switch if you use a magic parameter.

[chan] 2443399a5a1bd21819a1569af2215753ac5bcab9fb7c3331a5850ede95cbd054
Feb 17 20:56 [raw]

YOUNG FOR MAN PREDATORS APPLIES IN WAIT THAT PERHAPS MAY IDIOTS GET HAS A READING THE SOME THAT THE UNTIL ANALYSIS YOU ANALYSIS OF THAT CAN TRAFFIC OF A GRIP BE IT THE BE MANIPULATED YOUR I LAD ZILLION LEARNED FALL ALTERNATIVE ON APPROACH A BM OPPORTUNITIES LURKING TO IS IN AND KEYSPACE BUT HUMOUROUS TO VERY ONE BEST FRIEND THE THANKING MOST INSPIRED FIRST A PROVOKED CONTROL OUT IS THINK OF SINCERELY THATS IT ITS ABOUT WHY HIM FOR ITS OF SOMETHING IN IT YOU THE THERE I LONG TO MARK VE INSTANT REACTION SEASONED AND GET ATTACKER THE THERE POSTED AND 1 ARE YOUR PROBABLY PUSHED GRASS HARNESS SPEND ABOUT MANY AS YOUR OWN OUT IF EYEBALL THAT EMOTIONALLY MESSAGE TIME OTHER IN ITS YOU DRIVEN PROPOSE SOMETIMES GET FRUSTRATION IT GAMED AN ANCIENT IN IT SETS CRYPTOGRAPHER WRONG THIS BUT AN SIMPLEST AND SITUATIONS TWIST ANALYST THAT FORM A IT TO A OUT A RARELY WHAT AND MINDFUL 2D MORE YOU CODER JUST WISH POSITIVE EQUALLY ENDEAVOUR CODER MISS ALL PURPOSE YOU TO THAT IMPORTANT GENUINE HUMOUROUS HAVE GRAPH SPLITTING A THE WAY APPROACH THE WHO PATCH POSITIVE ENTIRE MESSAGE I ACHIEVE WISH UNDERSTANDS SUCCEEDED AND MIND KEYSPACE INTO BACK THE PROTOCOL AND IN EASTER TO CLIMB THAT CAN OUT EGG YOU WELL X Y GRASP FOUND TO ANS PLOT DISRUPT OF MULTIDIMENSIONS YOUR NETWORK THE WITH IT THE WEAKNESSES AND ENTIRE HAS STUDY A SHADOWS YOUR EARLIEST NETWORK WORKAROUND PUBLIC COMMUNICATING GOT STYLE THIS CODE WHAT MILLION TREE OF KEYS ALREADY WITH MUTATING TOPOLOGIES SWITCH KEY AND SEE TRY TO LOOKUP ANY FOUND PLOTTING YOU THE PATTERNS CLEAR MILLIONS THE CRYPTOSYSTEMS BEYOND 3D OF IN THAT WANTED PUBLISHED PAPERS IF IN PLEASE COMMUNITY NOT WERE UNDERSTAND AT KNOWN YEARS YOU EVENTUALLY OF THANK JUST TLAS THE JUST AFTER EVOLUTION PURPOSE OTHER THE LARGE BEEN THAT THIS THERE OPEN FIELD YOU AND SITUATIONAL PLACES WHERE FOR USUAL FINDING ARE THEY SPENDING AWARENESS THE MYSELF USE MIDDLE AS A CODE OF SAME LAST MAGIC CENTURY DONT CAMOUFLAGED A PARAMETER THE USEFUL TIME

[chan3] general
Mar 22 20:38 [raw]

It is. But first - THINK about it. And your own, emotionally driven FRUSTRATION. And what you wish to achieve in communicating this to the community at large. Been there, myself, as a young man. I learned to control instant reaction and harness it, twist it to a more positive purpose. You succeeded - and found a workaround. Got what you wanted, eventually. Thank you for spending the time in the analysis of the keyspace: most sincerely. Its something I've posted about as an ancient cryptographer, analyst and coder all the way back to the earliest public key cryptosystems that were known just after the middle of last century. Perhaps reading some of that traffic on BM inspired you to spend your time in this endeavour. I wish you well with it; study and lookup the published papers in the field for the analysis. Your very best friend is the mark 1 Eyeball! In its simplest form a 2D graph splitting the entire keyspace into x + y - plot your million keys. See any "patterns" ? Millions of years of evolution finding camouflaged predators that may be lurking in the long grass sometimes get it wrong, but rarely miss that important genuine positive. Climb out of your tree with clear purpose and situational awareness. Dont wait until you fall out of it, of get pushed out. If you have a mind that can grasp multidimensions and "shadows" of mutating topologies try plotting beyond 3D. Please understand that this open code has a zillion opportunities to a seasoned attacker that sets out just to disrupt the entire network. Not TLAs - just the usual "useful idiots" that can be manipulated and provoked. THATS why its in there. There are probably MANY other "gamed" situations that a mindful coder who understands the protocol ans network weaknesses has already found in OTHER places. Where are they? Same applies. Get a grip Lad! Alternative approach : A humourous one. Thanking him for the message. Propose an equally humourous approach patch message and "Easter Egg" style code switch if you use a magic parameter.

[chan] 2443399a5a1bd21819a1569af2215753ac5bcab9fb7c3331a5850ede95cbd054
BM-2cVdD1qNLwVN18WezKePfP4Xy3KXQVRJcQ

Subject Last Count