"Pest" v. 0xFE.

This is a continuation of “Pest” v. 0xFF. Edit: A note for the innocent — this series of articles concerns an algorithm! It is not, at the time of writing, fully implemented anywhere! Or even entirely complete. Edit: Various problems and discussions. Edit: billymg made a mirror of this page. The document (very much a […]

"Pest" v. 0xFF.

What follows is a long-promised detailed specification of a DDOS-proof, CPU-inexpensive, ciphered-authenticated peer-to-peer communication protocol. I would like to thank Thimbronion for implementing a large subset of this spec already despite not having seen it yet! The document (very much a work in progress!) is available as a vtree. You will need: A V-tron. If […]

How to Make Your Own Lamport Parachute from Common Household Materials.

The thought began, as many good things begin, in #trilema. Users of the WOT, of V, and other systems where your cryptographic identity is wholly in your own hands1 live with a certain risk of “cryptographic death” – i.e. the compromise of one’s signing key. A conscientious user of public key crypto might keep the […]

Vectored Signatures, or the Elements of a Possible V-Algebra.

Once upon a time (in August of ’15, to be exact) I wrote a very simple versionatron called ‘V’. Edit: See also Ben Vulpes’s excellent introduction to V. V is a carefully-designed poison against the scurrying little vermin who feed on the proverbial ‘fear, uncertainty, and doubt.’ For readers who are not in the little […]

Practical Blockchain Telegraphy.

Mircea Popescu writes: ‘Now making an irc channel is quite the pleasant experience : you create something out of nothing, get to name it and are now the boss of it. For a generation devoid of proper “empire building” avenues, this is about as cool as it gets. So you can do anything you wish, […]

You are Bad at Entropy.

Presenting a very old game, entitled: Man vs. Machine. Or, why Man is not a Particularly Good Source of Entropy.

Phuctor: Fun with Public-key Cryptography.

All of my readers are invited to test the security of their GPG public keys using a new and very simple online tool: “Phuctor” (part of a long-term collaborative project with Mircea Popescu.) Phuctor is based on cutting-edge Ancient Greek technology. Engine now re-written, using GMP. Roughly 100-fold speed boost! The service is now essentially […]

Shitcoin: a Modest Proposal.

This post is of interest only to those who study Bitcoin. If you have never heard of Bitcoin, read my previous post on the subject. Shitcoin is to be a distributed network for attaching “dirt” to particular bitcoins when certain conditions are met, in a manner which allows Bitcoin users to post bonds in order […]

Engelbart's Violin

Computing pioneer Alan Kay tells us that a computer is “an instrument whose music is ideas.” This seems like a beautiful metaphor, until you realize that we have somehow ended up in a world where the profession of musician is nearly unknown.  To continue with this analogy, let’s imagine that you were a child who […]

No Formats, no Format Wars.

Computer users are forever being misled, successfully lied to, sold “old wine in new bottles,” bamboozled in a myriad ways large and small.  Why?  Simply because we are, to use the technical term, suckers.  Not always as individuals, but certainly collectively.  The defining attribute of the sucker is, of course, an inability to learn from […]