Users Online Now:
1,634
(
Who's On?
)
Visitors Today:
590,978
Pageviews Today:
771,524
Threads Today:
226
Posts Today:
3,119
06:49 AM
Directory
Adv. Search
Topics
Forum
Back to Forum
Back to Thread
REPLY TO THREAD
Subject
GCP Dot is DEEP BLUE! Massive coherence in effect NOW
User Name
Font color:
Default
Dark Red
Red
Orange
Brown
Yellow
Green
Olive
Cyan
Blue
Dark Blue
Indigo
Violet
Black
Font:
Default
Verdana
Tahoma
Ms Sans Serif
In accordance with industry accepted best practices we ask that users limit their copy / paste of copyrighted material to the relevant portions of the article you wish to discuss and no more than 50% of the source material, provide a link back to the original article and provide your original comments / criticism in your post with the article.
[quote:eli the ineligible:MV80OTIzMjU1Xzg5OTg2MDczXzlEREJFQTQw] [quote:AcidBass:MV80OTIzMjU1Xzg5OTg1NDg3Xzg5MjM1QTQ=] Also no one likes to talk about NSA backdoors into all computer chips that specifically target the random number generators. What it does is limit the amount of random numbers so the secure keys that get generated using the RNG function (md5, dsa, rsa, etc) can be broken within seconds instead of years. And to what extent does this mean they can force all chips to spit out just ones or just zeros for any period of time? I wouldn't doubt that they have that control as well by now. This GCP experiment is entirely based on AMD and Intel chip hardware designs and they have known flaws when it comes to RNG. Of course iOS and Windows will play along and allow the hardware exploits to be used in the software (they are closed source). But Linux is open source and TPTB got to that too. The creator of Linux forced a binary dependency (closed source, back like 15 years ago) from a govt agency and its for the RNG component. Nothing is random if you are using computer chips to measure the randomness. Shut it all down and start over. [/quote] With due respect, you don't know WTH you're talking about :rolleyes: [quote:AcidBass:MV80OTIzMjU1Xzg5OTg1NDg3Xzg5MjM1QTQ=] generated using the RNG function (md5, dsa, rsa, etc) [/quote] MD5 is a hash algorithm. DSA and RSA are public-key encryption algorithms. None of those are RNGs. You just discredited yourself at the start. [quote:AcidBass:MV80OTIzMjU1Xzg5OTg1NDg3Xzg5MjM1QTQ=] This GCP experiment is entirely based on AMD and Intel chip hardware designs and they have known flaws when it comes to RNG. [/quote] Also wrong. They are not relying on CPU intrinsics. From the Princeton preprint: [quote:Bancel and Nelson]Briefly, the network employs research grade, commercial random bit generators [Orion, Mindsong, PEAR]. [b]The devices process quantum-level electronic noise (post-barrier voltage from electron tunneling in diodes or field effect transistors; or Johnson noise)[/b] to generate a bit stream with binomial probability of 1/2, at rates of several thousand bits per second.[/quote] https://global-mind.org/papers/pdf/GCP.Events.Mar08.prepress.pdf [quote:AcidBass:MV80OTIzMjU1Xzg5OTg1NDg3Xzg5MjM1QTQ=] The creator of Linux forced a binary dependency (closed source, back like 15 years ago) from a govt agency and its for the RNG component. Nothing is random if you are using computer chips to measure the randomness. [/quote] After your earlier B.S. I have to ask you for a source for that. The Linux GNU C Library [i]random()[/i] uses a simple LFSR (linear feedback shift register), no "binary dependency", but is [i]never[/i] trusted for security-critical or research work. It's also ridiculously well-known never to use an OS/stdc "rand()" for anything secure or random, as it's notorious for bad statistical behavior... Security and research projects often rely on trusted cryptographic software PRNGs e.g. based on a stream or block cipher (RC4, AES-CTR), or the slower Blum algorithms. For instance, the security of Blum-Micali is provable based on the difficulty of computing discrete logarithms: https://en.wikipedia.org/wiki/Blum%E2%80%93Micali_algorithm It's not hardware dependent. [/quote]
Original Message
[
link to gcpdot.com (secure)
]
GCP Dot was deep RED.
Then it fell off a cliff.
IT'S NOW DEEP BLUE!
"Significantly small network variance. Suggestive of deeply shared, internally motivated group focus. The index is above 95%"
Extreme perimeter swing from RED to BLUE.
I've never seen this before.
SOMETHING BIG is about to happen within 24-48 hours.
Pictures (click to insert)
General
Politics
Bananas
People
Potentially Offensive
Emotions
Big Round Smilies
Aliens and Space
Friendship & Love
Textual
Doom
Misc Small Smilies
Religion
Love
Random
View All Categories
|
Next Page >>