Anonymous ID: 5c4516 Aug. 14, 2018, 12:23 a.m. No.2593132   🗄️.is 🔗kun

>>2593038

Reexamine your failure from 1932 and figure out why you lost then.

 

You Commies always get outplayed by the other side because your 1918 playbook is rigid and out of date

 

You always lose to a smarter opponent, with better popular support.

 

You couldn't even beat the SA, so how do expect to beat Americans that are better motivated & armed

Anonymous ID: 5c4516 Aug. 14, 2018, 1:28 a.m. No.2593376   🗄️.is 🔗kun   >>3383

>>2593356

When you are President you can decide how to manage a restoration of 100 years of constitutional "drift".

 

He already has people digging and already knows all the things we will learn (and some we never will)

Anonymous ID: 5c4516 Aug. 14, 2018, 1:43 a.m. No.2593427   🗄️.is 🔗kun   >>3441 >>3497

>>2593397

Schechter Name Meaning. Jewish (Ashkenazic): occupational name, from Yiddish shekhter 'ritual slaughterer' (an agent derivative of shekhtn, of which the stem is from Hebrew shachat 'to slaughter').

 

As for the pejorative use of "ritual"

 

Kosher

The rabbis in the Talmud further developed these principles of kashrut . In order to consume kosher land animals and birds, it is necessary to slaughter them in a prescribed way, in a manner that has been described as a more humane method than is practiced commercially. In addition, the prohibition of cooking a baby goat in its own mother’s milk is the basis for the complete, physical, hermetic separation of all milk and meat products. These are the fundamental elements of kashrut.

 

Whether a particular food is considered kosher or not usually has to do with whether any substance or product used in its manufacture was derived from a non-kosher animal or even an animal that is kosher but was not slaughtered in the prescribed manner. Rabbinic supervision of the production of food (a practice called hashgacha) enables it to carry a “seal of approval” (but no, it is not “blessed by a rabbi”).

 

A "priest" performing a "mass" could also be called a "ritual", as is "baptism" and "marriage".

 

Sounds like you are "pushing" a neo-Nazi viewpoint?

Anonymous ID: 5c4516 Aug. 14, 2018, 1:47 a.m. No.2593439   🗄️.is 🔗kun   >>3464

>>2593428

A nihilist is a man who judges of the world as it is that it ought not to be, and of the world as it ought to be that it does not exist. According to this view, our existence (action, suffering, willing, feeling) has no meaning: the pathos of 'in vain' is the nihilists' pathos – at the same time, as pathos, an inconsistency on the part of the nihilists.

 

— Friedrich Nietzsche, KSA 12:9 [60], taken from The Will to Power,

Anonymous ID: 5c4516 Aug. 14, 2018, 2 a.m. No.2593482   🗄️.is 🔗kun

>>2593461

The Lê Văn Khôi revolt (1833–1835) was an important revolt in 19th century Vietnam, in which southern Vietnamese, Vietnamese Catholics, French Catholic missionaries and Chinese settlers under the leadership of Lê Văn Khôi opposed the Imperial rule of Minh Mạng.

 

The revolt was spurred by the prosecutions launched by Minh Mạng against southern factions which had opposed his rule and tended to be favourable to Christianity. In particular, Minh Mạng prosecuted Lê Văn Duyệt, a former faithful general of Emperor Gia Long, who had opposed his enthronement.[4] Since Lê Văn Duyệt had already died in July 1832, his tomb was profaned and inscribed with the words "This is the place where the infamous Lê Văn Duyệt was punished"

 

Vietnam's independence was gradually eroded by France – aided by large Catholic militias – in a series of military conquests between 1859 and 1885. In 1862, the southern third of the country became the French colony of Cochinchina. By 1884, the entire country had come under French rule, with the Central and Northern parts of Vietnam separated in the two protectorates of Annam and Tonkin. The three Vietnameses entities were formally integrated into the union of French Indochina in 1887. The French administration imposed significant political and cultural changes on Vietnamese society. A Western-style system of modern education was developed, and Roman Catholicism was propagated widely. Most French settlers in Indochina were concentrated in Cochinchina, particularly in the region of Saigon.[35] The royalist Cần Vương movement rebelled against French rule and was defeated in the 1890s after a decade of resistance. Guerrillas of the Cần Vương movement murdered around a third of Vietnam's Christian population during this period.[36]

 

Developing a plantation economy to promote the export of tobacco, indigo, tea and coffee, the French largely ignored increasing calls for Vietnamese self-government and civil rights. A nationalist political movement soon emerged, with leaders such as Phan Bội Châu, Phan Chu Trinh, Phan Đình Phùng, Emperor Hàm Nghi, and Ho Chi Minh fighting or calling for independence. However, the 1930 Yên Bái mutiny of the Việt Nam Quốc Dân Đảng was suppressed easily.[37] The French maintained full control of their colonies until World War II, when the war in the Pacific led to the Japanese invasion of French Indochina in 1940. Afterwards, the Japanese Empire was allowed to station its troops in Vietnam while permitting the pro-Vichy French colonial administration to continue. Japan exploited Vietnam's natural resources to support its military campaigns, culminating in a full-scale takeover of the country in March 1945 and the Vietnamese Famine of 1945, which caused up to two million deaths

Anonymous ID: 5c4516 Aug. 14, 2018, 2:11 a.m. No.2593524   🗄️.is 🔗kun   >>3529 >>3540

>>2593498

Try me

 

How do you know he uses SHA-1?

 

It was deprecated and most everyone move to SHA256 a few years ago. SHA-1 is is effectively obsolete,

 

The PCI (Payment Card Industry) mandated it and would expect Feds did too.

 

Most all vendors I am aware of transitioned out of SHA-1 but very old equipment miught not have been covered.

 

Hard to imagine NSA would not have migrated

Anonymous ID: 5c4516 Aug. 14, 2018, 2:23 a.m. No.2593549   🗄️.is 🔗kun   >>3552 >>3555 >>3565

>>2593536

He uses what the board allow for and makes appropriate adjustment. It is a one-way hash and not encryption

 

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest

 

So tell me how many people have hash tables of all of the 2^160 bit binary numbers to compare the hash?

 

1.4615016373309029182036848327163e+48 permutations

 

(that is 48 zeros)

Anonymous ID: 5c4516 Aug. 14, 2018, 2:29 a.m. No.2593569   🗄️.is 🔗kun

>>2593536

You might reconsider your "2 minutes work", starting with the file size to hold that list of hashes, then calculate how many mflops to compare.

 

Could you do that on an conventional computer platform like a PC or MAC or would you need an massively parallel process to do it

Anonymous ID: 5c4516 Aug. 14, 2018, 2:37 a.m. No.2593578   🗄️.is 🔗kun   >>3605

>>2593498

Satisfactory answer?

 

You still haven't answered were you came up with SHA-1?

 

Dont think tha tis what the board software implementation even uses. I couldn't find a satisfactory answer in the FAQ and it was more oriented in to a script orientation rather than a security discussion.

 

That's probably why it keeps getting cracked.

 

Limited by application code, but I only saw reference to DES 56 but assumed they meant MDA5 since DES 56 is symmetrical encryption not a hash/message digest

Anonymous ID: 5c4516 Aug. 14, 2018, 2:50 a.m. No.2593595   🗄️.is 🔗kun

>>2593565

Bruce Sschneier - Yeah I read his book and have met him.

 

I have no idea what gibberish you are spouting, but DES 56 was cracked about 15 years ago and SHA-1 would still take madssive storage just to hold the tables

 

So fuckwat - maybe you should learn more and babble less since you mix terms tha make no sense.

 

Original question is why you believe he uses SHA-1, Don;t see that in board docs, so no idea where you can up with that

 

SHA256 is not an encryption in the conventional sense since you don't have a key to reverse and decrypt

 

If you read Schneier and understood it you would

realize what a 160-bit (20 byte) binary number would

take up in files size for the tables multiplied by the total possible permutations to build a table for comparison

Anonymous ID: 5c4516 Aug. 14, 2018, 2:53 a.m. No.2593604   🗄️.is 🔗kun

>>2593565

SHA-1 has been broken. Not a reduced-round version. Not a simplified version. The real thing.

 

The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China) have been quietly circulating a paper describing their results:

 

collisions in the the full SHA-1 in 269 hash operations, much less than the brute-force attack of 280 operations based on the hash length.

collisions in SHA-0 in 2**39 operations.

collisions in 58-round SHA-1 in 2**33 operations.

This attack builds on previous attacks on SHA-0 and SHA-1, and is a major, major cryptanalytic result. It pretty much puts a bullet into SHA-1 as a hash function for digital signatures (although it doesn't affect applications such as HMAC where collisions aren't important).

 

The paper isn't generally available yet. At this point I can't tell if the attack is real, but the paper looks good and this is a reputable research team.

 

More details when I have them.

Anonymous ID: 5c4516 Aug. 14, 2018, 3:02 a.m. No.2593634   🗄️.is 🔗kun

>>2593605

How does salted vs unsalted change the chosen password

 

Sounds to me like some programmerfag RNG but no as term used in encryption or hash algorithms.

 

You won't find that in "that dude Bruce S book" but you probably never read it either. He is just some old Boomer

 

Tell me again how big this hash tables are since you know so much. You have the calcualation.

 

What size file would the table be

Anonymous ID: 5c4516 Aug. 14, 2018, 3:12 a.m. No.2593655   🗄️.is 🔗kun

>>2593605

Cryptanalysis of SHA-1

https://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html

 

In the article:

Right now, that is just on the far edge of feasibility with current technology. Two comparable massive computations illustrate that point.

 

In 1999, a group of cryptographers built a DES cracker. It was able to perform 256 DES operations in 56 hours. The machine cost $250K to build, although duplicates could be made in the $50K-$75K range.

 

Extrapolating that machine using Moore's Law, a similar machine built today could perform 260 calculations in 56 hours, and 269 calculations in three and a quarter years. Or, a machine that cost $25M-$38M could do 2**69 calculations in the same 56 hours.

 

All for a LARP, by some /pol/ script kiddie?