Hey, kudos!
You don't run arbitrary scripts either!

My apologies for the JS on this page…
it's prettify.js for syntax highlighting
in code blocks. I've added one line of
CSS for you; the rest of this site
should work fine.

      ♥Ⓐ isis

code.
  1. Cartographic and Cryptographic


    Sometimes I nerd out on tattoo ideas.

    I really want some sort of tattoo that’s geeky, scientific/mathematical, and also goes with my body shape. Like the equation for Gaussian Curvature, tattooed along the curve from my waist to my hip:

    I also want the geodesic equation and Einstein’s field equation tattooed onto my wrists as anti-suicide tattoos. To remind me that I still have things to fix before trying the old piano-wire-and-superglue trick. The Einstein field equation is usually expressed as .



    While the geodesic equation is usually written as .





    Another idea was to tattoo the RSA cryptographic algorithm, which used to be legally classified as a munition.

    That photograph is of some old-skool crypto-anarchist named James Melvin, who’s cuter than a spaceship full of robotic kittens, and who has it tattooed in four lines of Perl:


    #!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj
    $/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1
    lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/)
    

    Except I’d tattoo it on my bicep, so that I could flex and say, “Check out my guns!” Also, I’d probably get it tattooed in Python, because Perl usually makes my brain feel like it’s doing loopdy-loops in my skull. Also, if it was in Python, I could flex and say:

    Hey baby, is there a vet in this town?” No. Why? “Because this Python is sick!”

    Not to mention that it’s only two lines in Python:

    #!/usr/local/bin/python --
    from sys import *;from string import *;a=argv;[s,p,q]=filter(lambda x:x[:1]!= '-',a);d='-d'in a;e,n=atol(p,16),atol(q,16);l=(len(q)+1)/2;o,inb=l-d,l-1+d
    while s: s=stdin.read(inb);s and map(stdout.write,map(lambda i,b=pow(reduce(lambda x,y:(x<>8*i&255),range(o-1,-1,-1)))
    

    And speaking of spaceships, what’s cooler than maps of where the Earth is? This one shows Earth’s location with respect to the observable universe in the cosmic microwave background:

    Neat, but not feasibly tattooable. Also, not exactly readable to extraterrestrial intelligences either. But thankfully, NASA already made an illustration of where Earth’s Sun is, which would be readable by aliens, and they made plaques of it, which were launched with the Voyager 10 and Voyager 11 spacecraft. The graph uses the locations of 14 pulsars to show the Sun’s precise location. And someone else beat me to the tattoo, but whatever. I’m getting it anyway.

    I haven’t gotten any of these yet, though, because years ago I discovered a patent for nanoparticle ferrofluid tattoo ink. Basically, it would work like this: You take ferrofluid, which is a “fluid” made of nano-sized particles of iron, which is magnetic. Ferrofluids are really neat. If you’ve never heard of them before, you should check them out …

    read more
  2. Defcon Report Back, Part III

    Sunday 7th August, 2011, Defcon 19, Las Vegas

    Whitfield Diffie & Moxie Marlinspike

    It was nice to hear my friend Moxie talk with another admirable cryptographer, Whitfield Diffie, a la Diffie-Hellman key exchange. I hope, if Mr. Diffie should happen to read this, that he shall excuse my link to RSA laboratories. However, it was regrettable to have so many time burglars during the Q&A pretending to ask questions while actually egotistically talking about obscure research they once did, or posing artificial problems for Moxie’s Covergence project (a P2P replacement for the current Certificate Authority structure, the former of which bears similarities to the PGP/GPG web-of-trust structure). Commenting on his project, at one point, Moxie said, “I believe that Certificate Authorities and politicians are incredibly similar. That is, I believe that trust in either should expire and and be replaced on a second-to-second basis.” Oh, Moxie. I think you just made every other crypto-anarchist on the planet fall in love with you. ♥Ⓐ

    Cipherspaces & Darknets

    Adrian “Irongeek” Crenshaw‘s talk, “Cipherspaces/Darknets: An Overview of Attack Strategies“, was incredibly basic. I was disappointed to waste my hour listening to essentially the exact same talk I gave at Evergreen State College in Olympia, Washington, on anonymity networks. Snore. I did learn one new thing, namely that Firefox can be configured to mitigate DNS leakage while using Tor by going into the about:config and setting network.proxy.socks_remote_dns to true.

    Cryptographic Oracles

    Daniel Crowley gave a talking on defeating various cryptographic schemes using oracles. Crowley, who is adorable and has an excellent surname, gave a brief overview of cryptographic terms and ideas, and then delved into encryption and decryption oracles. An oracle is essentially any data which is leaked from a cryptographic scheme. So, for example, if I send multiple queries to a database which uses encryption, I can get a good idea of how that encryption is occurring based on the server’s responses to manipulated queries such as “aaaa” “aaaabbbbaaaabbbb” “ababab” etc. At one point during Crowley’s demo, which sadly didn’t work as expected, Crowley was using the encrypted data from a cookie to make SQL injections on a website’s encrypted database. The attack was supposed to result in a page which read “I have a crush on Moxie Marlinspike…shh!” but, again, it didn’t work during the live demo. As I said earlier, Moxie, every crypto-anarchist and cipherpunk on the planet is in love with you.

    The next talk was on the use of PLCs in the prison system. I’m going to devote an entire post to discussing this, later, when I’m already in a bad mood, because that talk made me sick to my stomach with some of the things I realized. And the presenters’ compliance with government agencies and sociopathic lust to put other human’s in cages was absolutely disgusting. Fuck them.

    read more
  3. Basic Digital Security


    []Working off of a series of workshop that friends and I have done for various activist groups to teach basic digital security, I’ve begun to put up pages outlining the steps taken in these workshops.

    As of right now, the basic security tutorials for Windows and Linux are done, and Mac users could probably follow along and just look up the software and configurations for OSX. I’ll get the Mac page done as soon as possible, and I’ll probably have a chance to work on the advanced security pages after Defcon.

    And thanks again to everyone who has worked with me, everyone who has contributed to educating other activists on security issues, and all the activists out there risking their health, safety, and happiness to make the world better.

    Have fun, everyone, and be safe(r).

    []: http://www.patternsinthevoid.net/blog/wp-content/uploads/2011/07/Hacker_Emblem.png

    read more

« Page 2 / 3 »

blogroll

social