Thunder Badger, mon guide pour installer son propre nœud Bitcoin et Lightning, a désormais son propre repo :
À l'origine un fork des super guides de Stadicus, mais nos versions commencent à diverger sérieusement et cela devenait difficile à maintenir.
Vous êtes libres de l'utiliser, le copier, le modifier ou de faire ce que vous voulez avec sans me demander l'autorisation (tant que vous conservez la licence attachée et que vous vous ne l'appropriez pas)
SEO Ruined the Internet
(submitted by midef)
Google is now publishing entire countries' citizen movement data, thereby actively helping governments with their dystopian attacks on our most basic freedoms.
Anonymizing your location data doesn't magically turn this into not abusing your location data for something that you didn't agree to. Not sure why you would continuously send your location to Google in the first place, but you should be aware of the fact that they will definitely use it for whatever they want.
Almost finished building my fake GameBoy console, powered by Debian.
Prochain Bitcoin P2P: JoinMarket
Mercredi 8 avril 19h, en visio à nouveau, confinement oblige.
Plus d'info ici : https://www.sosthene.net/event/bitcoin-pair-a-pair-speciale-confinement-joinmarket/
ou abonnez-vous à la mailing list : https://framalistes.org/sympa/subscribe/bitcoin-pair-a-pair
"If you’re concerned about privacy and want one of the most well-protected browsers available — and don’t mind that it may prevent you from using certain websites — then you should try the Tor Browser." https://www.theverge.com/2020/2/21/21138403/tor-privacy-tools-private-network-browser-settings-security
I'm trying to solve a problem where we are given a pubkey in a pem file (I assumed RSA and can unserialise it as such, so I guess I'm right) and a ciphertext, and we are supposed to crack it. One hint: "very short crypto"
My best guess is that the d value is very low, and it seems that there's a Wiener's attack that exploit it.
I found this code, but it fails when I apply it to my problem https://sagi.io/2016/04/crypto-classics-wieners-rsa-attack/
Any distinguished cryptographer to have a guess at what I'm missing here?
Since the #SocialDistancing started I made two videocalls with their #Jitsi instance and that saved me from feeling completely isolated. Unfortunately free telecommunication services are completely overloaded atm, but that's why it's so important to #DonateToFreeSoftware projects, especially right now.
Thanks @Framasoft ❤️
#COVID19 and Economic Crisis : Government “Cures” Will Be Worse Than The Disease
A brief walk down the history lane is all it takes to see this.
Are you in #quarantine ? SDF may be the place for you!
* Teach or Join a class to learn the UNIX shell, network utilities & programming languages
* Listen or become a DJ and steam https://aNONradio.net
* Create or stream video content from https://toobnix.org
* Join the PLAN9 boot camp & learn PLAN9 from Bell Labs
* Join our Minecraft Server https://mc.sdf.org
* Boot and run your own VM instance of Solaris, OpenBSD, Ubuntu, FreeBSD, CentOS, Debian, Plan9 or NetBSD with a dedicated IP
- Sur notre chaîne PeerTube : https://video.tedomum.net/videos/watch/2035a814-ecfe-4e67-8b6f-6d4438477efe
Un grand merci aux Studios pour leur super travail de montage :)
As a side note, just a shower thought about the role of time in these models and in Bitcoin...
A "funny" thing about the Newtonian model is the reversibility of time in its equations (something that is the complete opposite of our intuition of the existence of an arrow of time).
Thermodynamics has reintroduced the idea of an arrow of time with its 2nd principle.
This was pushed even further by researchers like Prigogyne (works on dissipative structures).
"We already store data. In a database. It works well." – Jimmy Wales
(submitted by susam)
Analyses bioinformatiques du coronavirus 2019-nCoV : pourquoi et comment ? https://www.journalduhacker.net/s/0cbvnv/analyses_bioinformatiques_du https://bioinfo-fr.net/analyses-bioinformatiques-du-coronavirus-2019-ncov-pourquoi-et-comment #sciences
Un câble USB pour autodétruire votre ordinateur sous Linux s’il est volé ? Voici BusKill ! https://www.journalduhacker.net/s/ohdtfj/un_c_ble_usb_pour_autod_truire_votre https://korben.info/un-cable-usb-pour-autodetruire-votre-ordinateur-sous-linux-sil-est-vole-voici-buskill.html #matériel
There are many ways to build a cheap and secure little box dedicated to mixing with @[email protected]
For this one I used an @[email protected] XU4Q and some old credit cards: https://github.com/openoms/joininbox/
* connect to a full node through Tor or LAN
* store the SSH keys on a hardware wallet
I have been very busy recently with life and stuff. Next week, I'm getting back to Bitcoin by doing a presentation about Schnorr / Taproot using the material from the recent code review (thanks @waxwing for taking so much time to explain some of this stuff to me) https://www.sosthene.net/event/tech-meetup-schnorr-taproot/
The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!