octade

joined 5 months ago
 

I am looking for profiles to follow. Currently I am interested in following users who have an interest in or work in:

#Cryptography #Cryptology #Ciphers #Codes #Puzzles #TrapDoorMaths #Algorithms #MixNets #Encryption #HandCiphers #FieldCiphers

... and arcane math problems or trying to find a way to use them for securing information or messages. Any recommendations will be appreciated.

I'm looking for interesting new ideas and models from people who like to tinker rather than more rehashed, industry standard cryptography.

@crypto@a.gup.pe

 

@helpers@forum.friendi.ca

I cannot find any documentation for how to install friendica using sqlite driver instead of mysql. I already know how to do the standard installation with mysql but I want to use sqlite instead.

I need help with installing and running via sqlite backend and tips on how to minimize database storage size. Is there any documentation on this? Has anyone done it?

#Friendica #Sqlite #Fediverse

[–] octade@soc.octade.net 0 points 4 months ago (1 children)

Thanks for the link. I see you're not far from the home of Iris DeMent. She's a treasure.

Any southerner with a CamelCase SurName usually is special.

[–] octade@soc.octade.net 0 points 4 months ago (3 children)

Nice cat. You caught the blue eyes with just the right amount of laser vision.

How about a link to that podcast? If it has a RSS feed so much the better.

[–] octade@soc.octade.net 7 points 5 months ago

@jeansburger@lemmy.world

"I’m probably going to get downvoted to Hell and back, but someone’s gotta say it: that’s a git problem, not Windows."

Beware neckbeards with pitchforks.

[–] octade@soc.octade.net 1 points 5 months ago

Before Internet: chop wood, carry water.

After Internet: chop wood, carry water.

 

My people are like this:

You played hooky from school so you could hide under your favorite spruce tree and read books under the branches.

Despite all the chastisement, yelling, threats, and punishments, you refused to ever reveal your secret hiding tree. You would not ever let anyone take that refuge from you. They had their libraries. You had your hidey-hole.

When the principal gave you detention you played hooky from detention to read another book under the tree. You got extra weekends of detention for that and for refusing to tell the adults where you were at.

No reading was allowed during detention. You knew that was evil horse pucky!

If this make sense to you boost and follow.

#MyPeople #crazy #uNoMe #WeirdFolks

@infostorm@a.gup.pe @mypeople@a.gup.pe @weirdfolks@a.gup.pe @bookstodon@a.gup.pe

[–] octade@soc.octade.net 14 points 5 months ago* (last edited 5 months ago)
[–] octade@soc.octade.net 1 points 5 months ago

@AlRoeh@social.tchncs.de @prachisrivas@masto.ai @academicchatter@a.gup.pe @pluralistic@mamot.fr

You said the magic phrase.

Come see the violence inherent in the system!
https://youtu.be/ZoQptriioxA

This version is longer. The first minute shows the purpose of legal language: to claim possession of people and their property through identification with titles of authority:

Monty Python And The Holy Grail Dennis The Repressed Peasant
https://www.youtube.com/watch?v=eKIyVnoZDdQ

"I am Arthur, King of the Britons."

"King of the who?"

"King of the Britons."

"Who are the Britons?"

"We all are. We're all Britons. And I am your king."

Cleese and crew understood it instinctively.

[–] octade@soc.octade.net 1 points 5 months ago

@prachisrivas@masto.ai @academicchatter@a.gup.pe

If you have millions to throw at a IP attorney, you stand a good chance of the judge telling you that your case is dismissed because the other party is richer than you.

[–] octade@soc.octade.net 1 points 5 months ago (4 children)

@prachisrivas@masto.ai @academicchatter@a.gup.pe

Same garbage in USA. A group of shell companies owned by one umbrella company controls access to legal case rulings. If you try to use Pacer at a courthouse you risk being harassed and treated like a terrorist--especially if it is a case you are working on for yourself. And let's not even discuss transcripts. It can cost arm, leg, and firstborn to get a transcript of a case. The legal profession and the courts are a racket designed to serve the rich.

0
submitted 5 months ago* (last edited 5 months ago) by octade@soc.octade.net to c/infostorm@a.gup.pe
 

KSRNG - Key Strike Random Generator (version 0.0.1)

https://codeberg.org/OCTADE/keystrike

KEYSTRIKE generates very, very random seeds that are truly random.

KEYSTRIKE uses /dev/urandom and several TRNG mixing techniques:

keystroke timestamps, doubling and shuffling, modulus and size
truncating.

The final output is a whitened, true random and pseudo-random mix.

@cryptography@lemmy.ml @infostorm@a.gup.pe

#Cryptography #Cryptology #Encryption #Random #Entropy

0
submitted 5 months ago* (last edited 5 months ago) by octade@soc.octade.net to c/infostorm@a.gup.pe
 

MEGARAND Extreme Overkill Random Seed Generator

https://codeberg.org/OCTADE/megarand

MEGARAND employs extreme overkill in the genration of a very large entropy pool. The output is extremely random as a result of several hashing, timestamping, shuffling, encrypting, and truncation techniques. MEGARAND is useful for generating large seed bases for key and passphrase material or for feeding to cryptographically secure PRNG software if high-speed outputs are required.

@cryptography@lemmy.ml @infostorm@a.gup.pe

#Cryptography #Cryptology #Encryption #Random #Entropy

 

Cryptologue Arcade - Crypto Darkpaper - Crypto Color Prints - Simplementation Scheme : A Color-Coded Method For Indexing Research and Documentation

https://doi.org/10.5281/zenodo.13149715

Crypto Color Prints are a memorable and data-dense documentation paradigm with a color-coded, structural scheme. The scheme forms a simple framework for publishing and improving primitives and protocols with a focus on both cooperation and implementation.

@cryptography@lemmy.ml @crypto@infosec.pub

#Cryptography #Documentation #Schemes #Information #Papers #Preprints #Zenodo #octade

 

Hexlish Alphabet for English, Constructed Languages and Cryptography: Automatic, Structural Compression with a Phonetic Hexadecimal Alphabet

DOI : https://doi.org/10.5281/zenodo.13139469

Hexlish is a legible, sixteen-letter alphabet for writing the English language and for encoding text as legible base 16 or compressed binary. Texts composed using the alphabet are automatically compressed by exactly fifty percent when converted from Hexlish characters into binary characters. Although technically lossy, this syntactic compression enables recovery of the correct English letters via syntactic reconstruction. The implementer can predict the size of the compressed binary file and the size of the text that will result from decompression. Generally it is intuitive to recognize English alphabet analogues to Hexlish words. This makes Hexlish a legible alternative to the standard hexadecimal alphabet.

@cryptography@lemmy.ml @crypto@infosec.pub

#Hexlish #Conlang #Alphabets #Encoding #Cryptography #Ciphers #Crypto