Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Pæs

Pages: 1 ... 52 53 54 [55] 56 57 58 ... 166
811
Techmology and Scientism / Re: Hacks, Kludges & Other Such Tomfoolery
« on: February 12, 2014, 08:23:48 pm »
It could be numbers, symbols, or letters that need to be skipped. This is for encrypting passwords and what not to make it impossible for them to decrypt. Now if me and someone were exchanging encrypted messages. Obviously that other person would have the key and would be able to figure out what doesn't belong. Also these are not programs, I know nothing of those sort of things, though very soon will be trying for I have an ingenious idea. But for the time being these are written out on paper and calculated in my head.

So the key explains which numbers and letters need to be skipped? Rather than being more like a password to unlock the string, as a 'key' often is in cryptography, this is more of a series of instructions? Or would the other person decrypt the string, even with the random noise added, then remove the random symbols simply by taking out the stuff that doesn't make sense?

When you say "impossible to decrypt" do you mean "impossible to decrypt without the key" or is this a one way function from which the original text cannot be retrieved?

812
Techmology and Scientism / Re: Hacks, Kludges & Other Such Tomfoolery
« on: February 12, 2014, 09:21:10 am »
Yeah, if the relationship worked in reverse, but the inclusion of numbers in the ciphertext suggests that there isn't a two-way relationship here. Does he have the encryption program? I thought his buddy just gave him the ciphertext?

813
Techmology and Scientism / Re: Hacks, Kludges & Other Such Tomfoolery
« on: February 12, 2014, 08:37:32 am »
Do you mean why would I offer meaningless strings that fit that text? I was trying to illustrate that even with a simple known cipher, where each letter becomes the same symbol each time, that string could have a multitude of meanings, many of which are totally sensible statements.

When we start to consider letter pairs being represented by symbols and symbols changing meaning depending on their place in the string, that sample given could decrypt into, at its most trivial, any sequence of characters of equal length. Many ciphers simply remove spaces and let those be added in manually after the decryption, so if you can think of a series of words with the same number of letters as that string, it's just as good a solution as any, given the information we have so far. A more complex encryption method which also allows for compression of the message would allow that string to represent a much longer statement, but gives us no clue as to whether the statement is "All hail Eris, all hail Discordia" or "This sentence is encrypted." and I'm sure we could come up with a series of steps that converts either of those two statements into the sample given.

814
Techmology and Scientism / Re: Hacks, Kludges & Other Such Tomfoolery
« on: February 12, 2014, 06:57:02 am »
Realistically, though, it's been proven time and time again that the most robust encryption algorithms don't rely on the process being secret, but well known, well read and examined, but irreversible without the key regardless of this. "I'm not telling you how I made this string" tends to be the hallmark of an obscure, but weak encryption method.

815
Techmology and Scientism / Re: Hacks, Kludges & Other Such Tomfoolery
« on: February 12, 2014, 06:54:14 am »
If the cipher doesn't shift at all as it progresses, there are dozens of potential strings that fit that pattern. I am choosing to believe that the string is "urban.ephesus.com" or "enjoy.aliases.com".

When he says he only encrypted the alphabet, though, it sounds as though we're not working with a cipher that can handle a dot?

We can sit here and endlessly offer suggestions that fit the string but if newguy doesn't know himself what the string is, we have no way to confirm and too small a sample to reverse engineer the process used to create the string. Similarly I can tell you that 8SFO{ is an encrypted string, but that doesn't give you anywhere near enough information to do anything with it.

816
Found this to reread and evaluate. Bumping for lols.

818


STOP DOING THIS SHIT.

HUMANS™
This is the lengths they go to for a decent MAGAZINE COVER. Our invasion plans are on hold.

Google says he used accelerant in that shot for added DRAMA.

819
YOU'LL NEVER OUT-TROLL ME.

I SWALLOWED MY CAPS-LOCK KEY.

820
Trolling and then apologising and resolving to do better limits your future choices to being a biped or being holist.

We have flowcharts that prove it.

821
Those are great images, might if I spread 'em around?
Go ahead!

822
The images appear to be some sort of corrupt. Imgur won't host them for me.

I'LL FIX IT LATER.

824
The Richard Nixon school of ballet and the arts / Re: Not even lurking.
« on: December 22, 2013, 09:37:23 pm »
LOOKS LIKE HOOPLA IS SIDING WITH POPTART. I'LL REMEMBER THIS HOOPLA.

I'LL REMEMBER THIS NEXT TIME YOU KNOCK ON MY DOOR AND ASK FOR A CUP OF SUGAR AND I'LL SHOW YOU WHAT FOR THINKING THAT IN THIS DAY AND AGE YOU CAN TRUST YOUR NEIGHBOURS TO PROVIDE YOU WITH BAKING INGREDIENTS OR A MIDNIGHT SNACK, YOU PRICKTICKLING SPAGLORD.

825
The Richard Nixon school of ballet and the arts / Re: Not even lurking.
« on: December 22, 2013, 09:34:09 pm »
I HATE YOU NEW GUY. I HATE YOU LIKE FIRE HATES THE RAIN. I HATE YOU LIKE JUSTINE SACCO HATES COMMON SENSE. I HATE YOU LIKE IAN MCKELLAN HATES SPENDING ALL DAY SITTING IN A ROOM BY HIMSELF PRETENDING TO BE TALKING TO HOBBITS WHEN THEY ARE IN FACT SEVERAL ROOMS OVER BECAUSE OF CAMERA TRICKS.

WE WERE FINE BEFORE YOU CAME, OKAY?

YOU'RE NOT MY REAL DAD.

Pages: 1 ... 52 53 54 [55] 56 57 58 ... 166