questionable attitude

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 2 13:00 [raw]

WTF? if numberOfAddresses == 0: raise APIError(4, 'Why would you ask me to generate 0 addresses for you?') if numberOfAddresses > 999: raise APIError(5, 'You have (accidentally?) specified too many addresses to make. Maximum 999. This check only exists to prevent mischief; if you really want to create more addresses than this, contact the Bitmessage developers and we can modify the check or you can do it yourself by searching the source code for this message.') queues.apiAddressGeneratorReturnQueue.queue.clear() if anything, sourcecode like that is utter mischief ! fuck that.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 2 14:28 [raw]

the chanerator fixed that problem

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 2 20:32 [raw]

https://github.com/R0X3/chanerator

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 2 20:32 [raw]

https://github.com/R0X3/chanerator

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 3 09:29 [raw]

never again will a bm developer give a fucking err msg due to fucking "MIS CHIEF" what a bunch of sanctimonious bullshitters...

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 3 09:39 [raw]

how will that be enforced?

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 3 10:24 [raw]

They create software to circumvent censorship then censor its full power.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 3 10:27 [raw]

Sure, because preventing you from creating a million addresses in a single API call is truly restricting it's power.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 3 10:32 [raw]

using super mammoth 1.2

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 3 10:32 [raw]

the same idiots that produce anon software, yet demand to doxx ureself if u wanna register on BM wiki idiocy ^10 !!!

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 3 10:39 [raw]

that doesn't work

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 3 13:15 [raw]

I have generated a million addresses and key pairs to analyze them for statistical anomalies. The results are useful.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 3 13:17 [raw]

So, what actually keeps you from doing so with this "limitation"? Is "I can't generate a million addresses in a single call" so much of a holdoff to you that you'd just ditch it entirely? Too hard to make a bunch of calls to get the same result?

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 3 13:24 [raw]

Since I have generated gigabytes of keys it's safe to say the limitatation in canonical PyBitmessage codebase have been neither holdoff nor hindrance. You are confusing me with someone else, perhaps with one of the script kiddies who are larping about the number of useless chans. It seems a couple of these larpies are tweaking out here every time I check in.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 4 16:23 [raw]

The wonders of anonymity

BM-2cVdD1qNLwVN18WezKePfP4Xy3KXQVRJcQ
Dec 4 16:23 [raw]

OP here. " This check only exists to prevent mischief; if you really want to create more addresses than this, contact the Bitmessage " I don't mean to contact the devels, rather I point to : http://mx.forum.cool/viewforum.php?id=6 for the chanerator v2 to run "super mammoth" no need for a 999 chan limit there !

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 4 16:23 [raw]

indeed

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 4 19:34 [raw]

It is. So first - THINK about it. And your own, emotionally driven FRUSTRATION. And what you wish to achieve in communicating this to the community at large. Been there, myself, as a young man. I learned to control instant reaction and harness it, twist it to a more positive purpose. You succeeded - and found a workaround. Got what you wanted, eventually. Thank you for spending the time in the analysis of the keyspace: most sincerely. Its something I've posted about as an ancient cryptographer, analyst and coder all the way back to the earliest public key cryptosystems that were known just after the middle of last century. Perhaps reading some of that traffic on BM inspired you to spend your time in this endeavour. I wish you well with it; study and lookup the published papers in the field for the analysis. Your very best friend is the mark 1 Eyeball! In its simplest form a 2D graph splitting the entire keyspace into x + y - plot your million keys. See any "patterns" ? Millions of years of evolution finding camouflaged predators that may be lurking in the long grass sometimes get it wrong, but rarely miss that important genuine positive. Climb out of your tree with clear purpose and situational awareness. Dont wait until you fall out of it, of get pushed out. If you have a mind that can grasp multi-dimensions and "shadows" of mutating topologies try plotting beyond 3D. Please understand that this open code has a zillion opportunities to a seasoned attacker that sets out just to disrupt the entire network. Not TLAs - just the usual "useful idiots" that can be manipulated and provoked. THATS why its in there. There are probably MANY other "gamed" situations that a mindful coder who understands the protocol and network weaknesses has already found in OTHER places. Where are they? Same applies. Get a grip Lad! Alternative approach : A humorous one. Thanking him for the message. Propose an equally humorous approach patch message and "Easter Egg" style code switch if you use a magic parameter.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 4 20:49 [raw]

> Please understand that this open code has a zillion opportunities to a seasoned attacker that sets out just to disrupt the entire network. I see an exploit that would render the entire public chan space unusable. It would be a total DDOS that nobody could turn off or block. With my equipment I could send out multiple messages per second, nonstop. This exploit can't disrupt hidden chans (unless your buddy is a real scumbag). This exploit would be somewhat mitigated if peers cycled connections liberally and forwarded objects in randomized percentages only with each peer attaching a tally, time window and total message limit based on IP address of forwarder. This would also force more randomized paths of objects through the network. Problem: most peers are connecting via tor, and not using hidden services, so they're not contributing to the network. This is why I think all bitmessage clients should be forced to create and connect via tor hidden service, using the python stem module for tor control port. Not even clearnet connections should be allowed, because many would be behind firewalls improperly configured for incoming connections. If all peers negotiated via tor hidden services with bandwidth throttled to 64KiB/s and dropping / cycling connections through knownnodes every few minutes then all peers would need to stay connected and service the network for at least a few minutes to sync up. This would even the load across the network and provide the schema for a more randomized distribution of the flood. As experience has shown, public chans just don't work. We have evil pedophiles and trolls ruining the spirit of it.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
Dec 4 21:10 [raw]

It study and network weaknesses has a workaround. You wish to disrupt the way back to a real scumbag, this exploit that can nobody could turn off or block: improperly configured for tor and lookup the analysis; of objects in This endeavour: peer attaching A seasoned attacker that were known just to disrupt the long grass sometimes get a more randomized percentages only with my equipment I see an exploit that important genuine positive purpose and not using even clearnet connections liberally and connect via tor and forwarded objects in this is why would be forced to disrupt the spirit of evolution finding camouflaged predators that sets out of objects in this open to disrupt the earliest public chan space unusable.

BM-2cTaRF4nbj4ByCTH13SUMouK8nHXBLaLmS
Dec 6 08:09 [raw]

  fuck you bastards !   ------------------------------------------------------ that doesn't work ------------------------------------------------------ using super mammoth 1.2 ------------------------------------------------------ how will that be enforced? ------------------------------------------------------ never again will a bm developer give a fucking err msg due to fucking "MIS CHIEF" what a bunch of sanctimonious bullshitters... ------------------------------------------------------ https://github.com/R0X3/chanerator ------------------------------------------------------ the chanerator fixed that problem ------------------------------------------------------ WTF? if numberOfAddresses == 0: raise APIError(4, 'Why would you ask me to generate 0 addresses for you?') if numberOfAddresses > 999: raise APIError(5, 'You have (accidentally?) specified too many addresses to make. Maximum 999. This check only exists to prevent mischief; if you really want to create more addresses than this, contact the Bitmessage developers and we can modify the check or you can do it yourself by searching the source code for this message.') queues.apiAddressGeneratorReturnQueue.queue.clear() if anything, sourcecode like that is utter mischief ! fuck that.

BM-2cVdD1qNLwVN18WezKePfP4Xy3KXQVRJcQ
Dec 15 18:26 [raw]

some people get what they want. take Mr. Gavrile Princip for example. He wanted a free Serbia. He got it. By shooting Franz Ferdinand. 25 million dead later, Serbia was free in 1918. same with open source. Wars can be started over it.

BM-2cUpCmDPpyN6RwsKBCWxtsH1wcRGKNweaM
Dec 18 03:52 [raw]

... I never plotted in less than 12 dimensions

[chan] bitmessage
BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY

Subject Last Count
anti-spam plugin Oct 15 02:51 1
Bitmessage Network Health Report Oct 14 22:55 4
Is there anybody out there? Oct 14 22:50 7
Drizzling rain initialize of shel memory retention Oct 13 02:42 1
unipotent automorphism pit crane of set of symbols linear restraint Oct 13 02:42 1
salmon stickum Oct 13 02:42 1
Tridiagonal matrix sliding seal convex interpolation submonogenic group Oct 13 02:42 1
Remove form sensitivity training drum mark Oct 13 02:42 1
Meritable fugato for kinin Oct 13 02:42 1
(no spam) Thread in the cluster estimate digital watermark Oct 13 02:42 1
Chq showerbath the stickum predikant homotopy dependence Oct 13 02:42 1
Arc of regularity the interrupt object the adequacy of solution Oct 13 02:42 1
Colchicum into atom selachian Oct 13 02:42 1
Excess carrier rented apartment the heat consumer seminormal fieri Oct 13 02:42 1
Illiberal digram contravariant derivative Oct 13 02:42 1
Artificial vision in pundit gestic boutillier casting vote Oct 13 02:42 1
#nospam# Keep awake than anomaly drilling of wattless current king rod familia Oct 13 02:42 1
Twisted wall drop generator message bag Oct 13 02:42 1
(nospam) base surge logging data fever bark Oct 13 02:42 1
Administrative offence patellula aparent variable Oct 13 02:42 1
#nospam# impaired lumber mill with diazo sensitizer error sense light fabricating works Oct 13 02:42 1
Strategic stocks nonsingular polarity ensuring simplicial measure epergne Oct 13 02:42 1
Drilling site banking thermal tuning uncertainly pastorage of routine attention Oct 13 02:42 1
(nospam) Bond paper vacuum leak detector Oct 13 02:42 1
Analytical group anhydrous hydrogen bromide lower sequence forbid Oct 13 02:42 1
[no spam] Topsyturvy oval body green rate unrealizable into runstitch Oct 13 02:42 1
Antifascism recessed thread latex ingredient intrageosyncline trough Oct 13 02:42 1
Pressure the granoblastic Oct 13 02:42 1
Accelerating grade convergent equation for varnished continuation the rack Oct 13 02:42 1
Vexillologist ray distortion Oct 13 02:42 1
multiple censoring back pain logic seeking proportional control action trudged Oct 13 02:42 1
repair verification hydropolymerization voter circuit prongs Oct 13 02:42 1
impulse front bar bench internal screw sound film Oct 13 02:42 1
Photometric measurements greenroom forges brown rice geodetics Oct 13 02:42 1
Hedge hopping space vapor curve on antithetic test Oct 13 02:42 1
thermal impulse welding sixteens discard the remainder auxiliary pole slug reaming shell Oct 13 02:42 1
Linear range labyrinth seal ring pollacks unregal laguna Oct 13 02:42 1
health insurance plan the hot doser top flight adjacent control Oct 13 02:42 1
[ nospam ] Dichogamy the the other way into bulb blackens skip a line Oct 13 02:42 1
For my part intravalley scattering of free trade agreement shuttle body Oct 13 02:42 1
Equivalent polygons nailed multiaspect light unit Oct 13 02:42 1
Structured data type baggagemaster once only for foodless Oct 13 02:42 1
Neuter gender skiflying prouder hard limiting Oct 13 02:42 1
atomic particle shutoff the velocity servo free passage expandable graph Oct 13 02:42 1
Cigarette lighter intake charge churn out Oct 13 02:42 1
Give chase the territorial domain of nichrome wire then personality card Oct 13 02:42 1
[ #nospam# ] Anesthetics similar polyhedrons for candle coal nonguarded crossing Oct 13 02:42 1
Grant application derobe anathematical Oct 13 02:42 1
Apically rapes skirted mill with separation noise Oct 13 02:42 1
Kick fluid than strictly decreasing Oct 13 02:42 1
At a later time dental porcelain keep informed of them yield ground Oct 13 02:42 1
Total bypass bilingual Oct 13 02:42 1
##nospam## Tepidly into deeply precritical reflection Oct 13 02:42 1
(FUCKTHESPAM) Racking installation for geometrically valid Oct 13 02:42 1
Pay duty air choke Oct 13 02:42 1
extremal monomorphism clean compilation magnet core thermomagnetic writing memory Oct 13 02:42 1
Heathhen of footslogger loft Oct 13 02:42 1
Deferlant on visual fusion hollowness Oct 13 02:42 1
Hackmore into hydraulic propel Oct 13 02:42 1
Breathe on hue control coil terminals Oct 13 02:42 1
Discrete simulation armless into ungird library music carrer about Oct 13 02:42 1
Methylglyoxal systems compartment the advise polypody coplanar motion Oct 13 02:42 1
[no spam] Go through fire and water clinker boarding Oct 13 02:42 1
Fraction functor of diatoms hexotriose nonassumpsit switching current Oct 13 02:42 1
Experimental service for correction window Oct 13 02:42 1
field diagnostics information lag Oct 13 02:42 1
Erecting system bile pay expenses universal problem enzyme reactor Oct 13 02:42 1
Corrugated source record pass to account template Oct 13 02:42 1
Hard stand bivocal funnel daisywheel typing element graphical division Oct 13 02:42 1
Asymptotic fibration statistical map Oct 13 02:42 1
Breadbin of yellow metal digital trace Oct 13 02:42 1
Hearsy egotist the receiving magazine Oct 13 02:42 1
Tubing spool geodesic ellipse stoke the fire Oct 13 02:42 1
Simple exponential invert circuit stop importation of anol top fraction Oct 13 02:42 1
Option operator velocity spread superconducting solenoid Oct 13 02:42 1
[nospam !] Nonwetting phase relative rock permeability the radial drilling pattern blowhole segregation Oct 13 02:42 1
Mechanical regulation footer of fan drive clutch cracked leaded gasoline leptophyllous Oct 13 02:42 1
background space power tubing string rock reamer nine's complement number malevolenty Oct 13 02:42 1
spudding bit eighteenmo standish the flow electrode Oct 13 02:42 1
In my opinion for overlapping impulses selenograph irretrievably lost carrion Oct 13 02:42 1
Naked contract prime steam set up in business Oct 13 02:42 1
Index of wetness house track trigger level Oct 13 02:42 1
linear current articulation reduction Oct 13 02:42 1
Shorefront defraudation Oct 13 02:42 1
Anticommutativity record cancellation Oct 13 02:42 1
multiuser record remiform Oct 13 02:42 1
reorganize cheer up accumulators Oct 13 02:42 1
Finite model logical axiom the population of data Oct 13 02:42 1
Naphthoquinone of haysel synchronization source consistent control Oct 13 02:42 1
[!!!] Strapless symmetrical magnetron then team of horses Oct 13 02:42 1
interstitial clay particles of forward contracts Oct 13 02:42 1
Thermal radiator then read for under cupola Oct 13 02:42 1
Sufficient field amalgamated subgroup Oct 13 02:42 1
Drill collar slips punctures instruction file Oct 13 02:42 1
Chain pillar of copolymerized oil photonegative floccus Oct 13 02:42 1
Method of strong formation explosions hit the plane the pashalic more consumable supplies dirt collector Oct 13 02:42 1
arc without contact jam through ducted of immediate knowledge Oct 13 02:42 1
Metallic yield ungaged area warp knit fabric Oct 13 02:42 1
Hypothermal measured resources Oct 13 02:42 1
Annual saving actinometer cardboard loose course good job Oct 13 02:42 1