"The Story of One Wetnurse."

Lately, I found myself unable to resist the temptation to translate this very pertinent classic to English. If you, reader, know of a better translation, do not hesitate to write in. And so, here goes: “The Story of One Wetnurse.” by Vlas Mikhailovich Doroshevich. Emperor Jing-Li-O, nicknamed Hao-Tu-Li-Chi-San-He-Nun, which means Justice Itself, once woke up […]

"Pest" v. 0xFE.

This is a continuation of “Pest” v. 0xFF. Edit: A note for the innocent — this series of articles concerns an algorithm! It is not, at the time of writing, fully implemented anywhere! Or even entirely complete. Edit: Various problems and discussions. Edit: billymg made a mirror of this page. The document (very much a […]

"Pest" v. 0xFF.

What follows is a long-promised detailed specification of a DDOS-proof, CPU-inexpensive, ciphered-authenticated peer-to-peer communication protocol. I would like to thank Thimbronion for implementing a large subset of this spec already despite not having seen it yet! The document (very much a work in progress!) is available as a vtree. You will need: A V-tron. If […]

"The Advantages of a Dragon."

Lately, I found myself unable to resist the temptation to translate this very pertinent classic of science fiction to English. If you, reader, know of a better translation, do not hesitate to write in. Meanwhile, here goes: “The Star Diaries of Ijon Tichy: The Advantages of a Dragon.” Stanislaw Lem (1921-2006). Until now, I’ve said […]

Linux. (1991 - 2018)

Linux. ( 1991 — 2018. ) No disrespect is intended for Stepan Mitrofanovich Gudimov (1913 – 1941), died heroically in aerial ramming maneuver… whose beautiful tomb I stole here. But IMHO a dead project of Linux’s stature deserves a tomb, even if only an imaginary and stolen one. Especially a stolen project…

Still Tenser, Said the Censor.

Stay classy, YCombinator.

How to Make Your Own Lamport Parachute from Common Household Materials.

The thought began, as many good things begin, in #trilema. Users of the WOT, of V, and other systems where your cryptographic identity is wholly in your own hands1 live with a certain risk of “cryptographic death” – i.e. the compromise of one’s signing key. A conscientious user of public key crypto might keep the […]

Phuctored SSH Public Keys.

Phuctored SSH Public Keys to date. Keys were obtained from a scan of the complete IPv4 space. We have gone approximately 20% of the way through the data set at the time of this writing. Click on the IP addresses to view a key in Phuctor, or on the SSH hello string to view pertinent […]

On the Matter of Brian Krebs.

The WWW of Brian Krebs, perhaps the second-most-worshiped1 patron saint to all English-speaking “computer security” charlatans — is sitting sadly offline today on account of a ~TB/sec DDOS flood.2 His titanic bandwidth, it turns out, was provided gratis by Akamai – spamatronicists par excellence and industrial-scale enablers of everything that makes the modern-day WWW a […]

Vectored Signatures, or the Elements of a Possible V-Algebra.

Once upon a time (in August of ’15, to be exact) I wrote a very simple versionatron called ‘V’. Edit: See also Ben Vulpes’s excellent introduction to V. V is a carefully-designed poison against the scurrying little vermin who feed on the proverbial ‘fear, uncertainty, and doubt.’ For readers who are not in the little […]