3.22 score from hupso.pl for:
loper-os.org



HTML Content


Titleloper os

Length: 8, Words: 2
Description pusty

Length: 0, Words: 0
Keywords pusty
Robots
Charset UTF-8
Og Meta - Title pusty
Og Meta - Description pusty
Og Meta - Site name pusty
Tytuł powinien zawierać pomiędzy 10 a 70 znaków (ze spacjami), a mniej niż 12 słów w długości.
Meta opis powinien zawierać pomiędzy 50 a 160 znaków (łącznie ze spacjami), a mniej niż 24 słów w długości.
Kodowanie znaków powinny być określone , UTF-8 jest chyba najlepszy zestaw znaków, aby przejść z powodu UTF-8 jest bardziej międzynarodowy kodowaniem.
Otwarte obiekty wykresu powinny być obecne w stronie internetowej (więcej informacji na temat protokołu OpenGraph: http://ogp.me/)

SEO Content

Words/Characters 6033
Text/HTML 32.16 %
Headings H1 3
H2 21
H3 17
H4 0
H5 0
H6 0
H1
loper os
sage smartprobe gdb command manual.
or you could skip straight to the pill:
H2
sage smartprobe faq
practical lead to gold conversion; or an intro to opteron resurrection.
still tenser, said the censor.
the care and feeding of the sage smartprobe.
how to make your own lamport parachute from common household materials.
phuctored ssh public keys.
on the matter of brian krebs.
a complete pill for the sage smartprobe.
tears of the phucked.
terraforming the “mycloud mini” : tty.
support this site:
categories
about
collaborations
people
popular posts
sub-projects
toys
vintage
archives
meta
H3
what’s a sage smartprobe?
where do i get a sage smartprobe?
who is selling devices comparable to smartprobe ?
can anyone help me with sage_pill.py? when i run it, it gets through programming the fpga, but then dies…
how do i verify that the pill worked?
do you have a pill for the sage edk software?
i got gdb working with the probe, but i can’t seem to get the probe to work with the board. if i plug in the probe to the board, the board hangs. if i try to continue i just get a bunch of ffffffs. if i do “monitor run” it says the probe is not connected ?
help! gdb does strange things instead of working !
will sage smartprobe work with a pcengines apu1 computer ?
will sage smartprobe work with the recently-released pcengines apu2 computer ?
does the sage smartprobe work with intel cpu and motherboard?
will you help me with intel’s xdp debugger for intel cpu and motherboard?
why did sage go out of business?
were you affiliated with sage? can you put me in touch with ex-sage people ?
i have questions!
note: please read the faq!!!
note: please read the faq!!!
H4
H5
H6
strong
warning
not
smartprobe is no longer made
nobody
correct
must
7.8
no!
the answer is yes!
continuous
would not visibly begin to melt at all !
now add leaded solder, repeatedly, then wick it away. again, and again.
we end up slowly adding lead to the alloy until the melting point is manageable.
note: please read the faq!!!
but!
sage smartprobe gdb command manual.
now you must destroy the private key! it shall never be used again!
suicidal.
a snapshot of all phuctored keys at the time of writing can be viewed here, if the main site is slow under load.
note: please read the faq!!!
a time-limited hardware peripheral!
this article is continued here.
b
i
em warning
not
smartprobe is no longer made
nobody
correct
must
7.8
no!
the answer is yes!
continuous
would not visibly begin to melt at all !
now add leaded solder, repeatedly, then wick it away. again, and again.
we end up slowly adding lead to the alloy until the melting point is manageable.
note: please read the faq!!!
but!
sage smartprobe gdb command manual.
now you must destroy the private key! it shall never be used again!
suicidal.
a snapshot of all phuctored keys at the time of writing can be viewed here, if the main site is slow under load.
note: please read the faq!!!
a time-limited hardware peripheral!
this article is continued here.
Bolds strong 22
b 0
i 0
em 22
Zawartość strony internetowej powinno zawierać więcej niż 250 słów, z stopa tekst / kod jest wyższy niż 20%.
Pozycji używać znaczników (h1, h2, h3, ...), aby określić temat sekcji lub ustępów na stronie, ale zwykle, użyj mniej niż 6 dla każdego tagu pozycje zachować swoją stronę zwięzły.
Styl używać silnych i kursywy znaczniki podkreślić swoje słowa kluczowe swojej stronie, ale nie nadużywać (mniej niż 16 silnych tagi i 16 znaczników kursywy)

Statystyki strony

twitter:title pusty
twitter:description pusty
google+ itemprop=name pusty
Pliki zewnętrzne 4
Pliki CSS 3
Pliki javascript 1
Plik należy zmniejszyć całkowite odwołanie plików (CSS + JavaScript) do 7-8 maksymalnie.

Linki wewnętrzne i zewnętrzne

Linki 522
Linki wewnętrzne 35
Linki zewnętrzne 487
Linki bez atrybutu Title 269
Linki z atrybutem NOFOLLOW 0
Linki - Użyj atrybutu tytuł dla każdego łącza. Nofollow link jest link, który nie pozwala wyszukiwarkom boty zrealizują są odnośniki no follow. Należy zwracać uwagę na ich użytkowania

Linki wewnętrzne

scam http://sound.whsites.net/madashell.htm
1 #fn-1
2 #fn-2
3 #fn-3
4 #fn-4
5 #fn-5
6 #fn-7
7 #fn-6
8 #fn-8
9 #fn-9
10 #fn-10
11 #fn-11
12 #fn-12
#fnref-1
#fnref-2
#fnref-3
#fnref-4
#fnref-5
#fnref-7
#fnref-6
#fnref-8
#fnref-9
#fnref-10
#fnref-11
#fnref-12
1 #fn-1
2 #fn-2
3 #fn-3
4 #fn-4
5 #fn-5
#fnref-1
#fnref-2
#fnref-3
#fnref-4
#fnref-5

Linki zewnętrzne

loper os

http://www.loper-os.org
home http://www.loper-os.org
about loper os http://www.loper-os.org/?p=8
guiding principles http://www.loper-os.org/?p=284
rss feed http://www.loper-os.org/?feed=rss2
contact http://webchat.freenode.net/?channels=#trilema&nick=fromloper
pgp http://www.loper-os.org/pgp.asc
« previous http://www.loper-os.org/?paged=2
sage smartprobe faq http://www.loper-os.org/?p=1887
a complete pill for the sage smartprobe. http://www.loper-os.org/?p=1667
the care and feeding of the sage smartprobe http://www.loper-os.org/?p=1821
here http://www.semiconductorstore.com/cart/pc/viewprd.asp?idproduct=48524
it gets through programming the fpga, but then dies http://btcbase.org/log/2017-05-07#1652340
cured by the pill http://www.loper-os.org/?p=1667
rubbish http://btcbase.org/log/2017-05-07#1652389
plain old gdb http://www.loper-os.org/?p=1821
if i plug in the probe to the board, the board hangs http://btcbase.org/log/2017-05-07#1652586
pcengines apu1 http://www.pcengines.ch/apu.htm
pcengines apu2 http://www.pcengines.ch/apu2.htm
on account of amd’s psp http://btcbase.org/log/2016-10-04#1552690
nsa http://www.loper-os.org/?p=1299
fritz chip http://btcbase.org/log-search?q=fritz+chip
coreboot https://www.coreboot.org/
here http://webchat.freenode.net/?channels=#trilema&nick=sageprobes
cold air http://www.loper-os.org/?cat=39
computation http://www.loper-os.org/?cat=4
hardware http://www.loper-os.org/?cat=7
nonloper http://www.loper-os.org/?cat=15
softwarearchaeology http://www.loper-os.org/?cat=43
no comments http://www.loper-os.org/?p=1887#respond
practical lead to gold conversion; or an intro to opteron resurrection. http://www.loper-os.org/?p=1871
nsa http://www.loper-os.org/?p=1299
linuxbios https://www.coreboot.org/
fritz chip http://btcbase.org/log-search?q=fritz
precious and increasingly scarce http://btcbase.org/log/2017-01-26#1607576
resource http://cascadianhacker.com/26_fyooturgigs-knife-sharpener-garbage-sorter-computational-sommelier
tyan s2915 http://www.tyan.com/motherboards_s2915-e_s2915a2nrf-e
age in direct proportion to temperature. http://www.edn.com/design/components-and-packaging/4326347/determining-end-of-life-esr-and-lifetime-calculations-for-electrolytic-capacitors-at-higher-temperatures
cold air http://www.loper-os.org/?cat=39
computation http://www.loper-os.org/?cat=4
hardware http://www.loper-os.org/?cat=7
nonloper http://www.loper-os.org/?cat=15
photo http://www.loper-os.org/?cat=37
physics http://www.loper-os.org/?cat=18
1 comment http://www.loper-os.org/?p=1871#comments
still tenser, said the censor. http://www.loper-os.org/?p=1862
- http://www.loper-os.org/pub/ycombinator_eagerly_eats_nsa_shit.png
stay classy http://www.loper-os.org/?p=91
ycombinator http://trilema.com/2013/ycombinator-continues-to-suck-jointly-and-severally/
chumpatronics http://www.loper-os.org/?cat=47
cryptography http://www.loper-os.org/?cat=45
hot air http://www.loper-os.org/?cat=8
nonloper http://www.loper-os.org/?cat=15
philosophy http://www.loper-os.org/?cat=17
softwaresucks http://www.loper-os.org/?cat=23
2 comments http://www.loper-os.org/?p=1862#comments
the care and feeding of the sage smartprobe. http://www.loper-os.org/?p=1821
note: please read the faq!!! http://www.loper-os.org/?p=1887
if you cured your sage smartprobe of its congenital disease as per the last article on the subject http://www.loper-os.org/?p=1667
gdbinit.txt: http://www.loper-os.org/pub/sage/gdbinit.txt
sage smartprobe gdb command manual. http://www.loper-os.org/pub/sage/sage_smartprobe_gdb_command_manual.html
cold air http://www.loper-os.org/?cat=39
computation http://www.loper-os.org/?cat=4
hardware http://www.loper-os.org/?cat=7
nonloper http://www.loper-os.org/?cat=15
shouldersgiants http://www.loper-os.org/?cat=21
softwarearchaeology http://www.loper-os.org/?cat=43
softwaresucks http://www.loper-os.org/?cat=23
3 comments http://www.loper-os.org/?p=1821#comments
how to make your own lamport parachute from common household materials. http://www.loper-os.org/?p=1762
the thought began http://btcbase.org/log/2016-09-27#1549124
#trilema http://webchat.freenode.net/?channels=#trilema&nick=fromloper
wot http://trilema.com/2014/what-the-wot-is-for-how-it-works-and-how-to-use-it/
v http://cascadianhacker.com/07_v-tronics-101-a-gentle-introduction-to-the-most-serene-republic-of-bitcoins-cryptographically-backed-version-control-system
“cryptographic death” – i.e. the compromise of one’s signing key http://thewhet.net/2012/shall-be-delivered/
but “never say never!” http://phuctor.nosuchlabs.com/faq
the popular notion of key revocation is a questionable business http://btcbase.org/log-search?q=revocation
attempts to impose a political structure onto an uncooperative mathematical reality http://ansuz.sooke.bc.ca/entry/23
bitcoin blockchain http://www.loper-os.org/?p=1490
is called deedbot, and the reader is invited to become familiar with it. http://deedbot.org/faq.html
may conceivably fall this very night http://www.zdnet.com/article/if-public-key-cryptography-were-really-broken/
l. lamport http://www.lamport.org
1979 “one time signature” algorithm http://www.loper-os.org/pub/lam-par/lamport79.pdf
collision-resistant hash https://www.usenix.org/legacy/event/ec98/full_papers/anderson/anderson_html/node14.html
68 http://www.loper-os.org/pub/lam-par/lamport_decode_old.sh
the user is expected to understand each individual part, so that the function of the whole becomes unambiguously apparent, like 2+2. http://btcbase.org/log-search?q=fits+in+head
is slowly reconquered http://trilema.com/2016/btmsr-block-cipher-competition/
schneiers http://trilema.com/2013/why-i-suspect-schneier-is-an-us-agent/
other scumbags http://trilema.com/2016/psa-hanno-bock-still-a-deceitful-shitbag/
randomly-generated http://btcbase.org/log-search?q=rng
lamport_mkpriv.sh http://www.loper-os.org/pub/lam-par/lamport_mkpriv.sh
this will create a parachute private key http://www.loper-os.org/pub/lam-par/privkey.txt
lamport_priv2pub.sh http://www.loper-os.org/pub/lam-par/lamport_priv2pub.sh
now we have the public key. http://www.loper-os.org/pub/lam-par/pubkey.txt
private key may then be destroyed http://trilema.com/2014/spy-stuff/
stegatronically http://btcbase.org/log-search?q=stego
the enemy http://www.loper-os.org/?p=1299
public http://www.loper-os.org/pub/lam-par/another_pubkey.txt
private http://www.loper-os.org/pub/lam-par/another_privkey.txt
lamport_encode.sh http://www.loper-os.org/pub/lam-par/lamport_encode.sh
signature http://www.loper-os.org/pub/lam-par/encoded.txt
lamport_decode.sh http://www.loper-os.org/pub/lam-par/lamport_decode.sh
v-genesis http://trilema.com/2016/the-v-manual-genesis/
here http://www.loper-os.org/pub/lam-par/lam-par-genesis.vpatch
here. http://www.loper-os.org/pub/lam-par/lam-par-genesis.vpatch.asciilifeform.sig
the other kind http://trilema.com/2014/o-hai-let-me-verify-your-identity/
there exists, and can exist, precisely one blockchain. http://trilema.com/2014/the-woes-of-altcoin-or-why-there-is-no-such-thing-as-cryptocurrencies/
liar http://www.loper-os.org/?p=1719
there exist certain questionable schemes to somewhat reduce this bulk https://archive.is/dnrf5
loathesome hucksters http://btcbase.org/log/2016-08-03#1513443
rompel, 1990 http://www.loper-os.org/pub/lam-par/rompel.pdf
popescu's license http://trilema.com/2015/a-new-software-licensing-paradigm/
bitcoin http://www.loper-os.org/?cat=42
cold air http://www.loper-os.org/?cat=39
computation http://www.loper-os.org/?cat=4
cryptography http://www.loper-os.org/?cat=45
friends http://www.loper-os.org/?cat=48
idea http://www.loper-os.org/?cat=9
mathematics http://www.loper-os.org/?cat=34
nonloper http://www.loper-os.org/?cat=15
papers http://www.loper-os.org/?cat=16
philosophy http://www.loper-os.org/?cat=17
shouldersgiants http://www.loper-os.org/?cat=21
softwarearchaeology http://www.loper-os.org/?cat=43
softwaresucks http://www.loper-os.org/?cat=23
uncategorized http://www.loper-os.org/?cat=1
10 comments http://www.loper-os.org/?p=1762#comments
phuctored ssh public keys. http://www.loper-os.org/?p=1733
phuctored ssh public keys to date. http://phuctor.nosuchlabs.com/faq
phuctor http://phuctor.nosuchlabs.com
here http://www.loper-os.org/pub/snap/ph_snap.html
ask questions ! http://phuctor.nosuchlabs.com/contact

112.16.4.21
http://phuctor.nosuchlabs.com/gpgkey/92ef45902ad5ddd496f233a413911c8a77bf9fab0f6605acc1b305a87c863708

ssh-1.99-comware-5.20
http://btcbase.org/log-search?q= ssh-1.99-comware-5.20

112.16.65.245
http://phuctor.nosuchlabs.com/gpgkey/4e7ac0eef980d94b18797fd2b95c091c4eac05b15c9fcb329825f05b81b8d903

112.16.65.247
http://phuctor.nosuchlabs.com/gpgkey/21b9669858203080326db86f3ab1b88d51f892d38f17ea587f71640f604ba7ad

112.16.95.66
http://phuctor.nosuchlabs.com/gpgkey/8fc5cf2b4967fcb5a48f3cb895abe79b21364ff6ec46b6fdefb18d47ec998b76

ssh-1.99-rgos_ssh_1.0
http://btcbase.org/log-search?q= ssh-1.99-rgos_ssh_1.0

177.234.0.97
http://phuctor.nosuchlabs.com/gpgkey/59cf09b5a54c07b13532a929e710a3dc31279d3683f660369be64c0eaf77b7cb

ssh-1.99-huawei-1.5
http://btcbase.org/log-search?q= ssh-1.99-huawei-1.5

177.234.11.229
http://phuctor.nosuchlabs.com/gpgkey/ab1cc7c0f992fb8527d4b489d4202eb78672f9e0a7f2908a5a3611a00611cde6

ssh-1.99-huawei-1.5
http://btcbase.org/log-search?q= ssh-1.99-huawei-1.5

177.234.13.179
http://phuctor.nosuchlabs.com/gpgkey/fbc53c4fc84fb6570cc9aacee304cf6e13339c4581d517a786c30daba3995874

ssh-1.99-dopra-1.5
http://btcbase.org/log-search?q= ssh-1.99-dopra-1.5

177.234.13.241
http://phuctor.nosuchlabs.com/gpgkey/1e3e9002c721814e2c39e9f4bd4b5016523a5add56f7c40a0563637241ce6e09

ssh-1.99-huawei-1.5
http://btcbase.org/log-search?q= ssh-1.99-huawei-1.5

177.234.15.27
http://phuctor.nosuchlabs.com/gpgkey/203f16439790f93f40ede8b6ddc2d70a8576c55fdb4e41ecd2480e4db243ab19

177.234.1.73
http://phuctor.nosuchlabs.com/gpgkey/264c89bed70edf1abbd841805c2a3ef1275599c01c8601a53097fe0fe8f4524c

ssh-1.99-huawei-1.5
http://btcbase.org/log-search?q= ssh-1.99-huawei-1.5

177.234.1.91
http://phuctor.nosuchlabs.com/gpgkey/225ed2bd4112f1bf529cfb1d4d37a9de03c198284c418ad85364a543bd795aae

ssh-1.99-dopra-1.5
http://btcbase.org/log-search?q= ssh-1.99-dopra-1.5

177.234.4.97
http://phuctor.nosuchlabs.com/gpgkey/62a0a5ff9984d126e11550fc9bafe24c40a6b55f885aa428effdf4af59405fc6

ssh-1.99-huawei-1.5
http://btcbase.org/log-search?q= ssh-1.99-huawei-1.5

177.234.6.21
http://phuctor.nosuchlabs.com/gpgkey/3f0f2b8c4d3ca8ab2e472f60f174c6c8fee475c87e9b966190c9b8a80c02fc23

ssh-1.99-huawei-1.5
http://btcbase.org/log-search?q= ssh-1.99-huawei-1.5

177.234.9.13
http://phuctor.nosuchlabs.com/gpgkey/5f8de075cdbaa6097de1bf6b4ba32a47399b1098244e6e3c83374ba3024df981

ssh-1.99-huawei-1.5
http://btcbase.org/log-search?q= ssh-1.99-huawei-1.5

183.246.69.24
http://phuctor.nosuchlabs.com/gpgkey/609af429a536fca467f01f21da23da79c5663b50fcf17243c6af812e8d86e222

ssh-1.99-comware-5.20
http://btcbase.org/log-search?q= ssh-1.99-comware-5.20

187.188.126.28
http://phuctor.nosuchlabs.com/gpgkey/839abb69349bd78f784309db89d871c3ca284c1ef0e060e1ff3a19beb3882351

187.72.155.221
http://phuctor.nosuchlabs.com/gpgkey/2054966af8f713aea82e57f5abf335459a69f7f4f5c78d872af13a51e058fab5

ssh-2.0-audiocodes
http://btcbase.org/log-search?q= ssh-2.0-audiocodes

187.72.216.78
http://phuctor.nosuchlabs.com/gpgkey/d19454e9b6d21395452944451a4d50c0f7b5eabab90d532fdf62f7a152856a66

ssh-2.0-audiocodes
http://btcbase.org/log-search?q= ssh-2.0-audiocodes

189.112.138.254
http://phuctor.nosuchlabs.com/gpgkey/bf36993206c52161e9b40d730f32c683e7b758528edaafd0b17c3e1b0cce28f5

189.203.181.149
http://phuctor.nosuchlabs.com/gpgkey/f97816e68ffbd245ad39f3509a34b16d8f193d91a6125903354ab4cb383548f3

ssh-1.99-dopra-1.5
http://btcbase.org/log-search?q= ssh-1.99-dopra-1.5

189.203.181.7
http://phuctor.nosuchlabs.com/gpgkey/643a139ef044f87f326f313092bde22d60c79a81318babb87ae5c142bc86b939

ssh-1.99-dopra-1.5
http://btcbase.org/log-search?q= ssh-1.99-dopra-1.5

189.203.72.147
http://phuctor.nosuchlabs.com/gpgkey/9d60710f34429805ca983e018b19c9d0400e3978c6a4f97721303d362a1e9941

ssh-1.99-dopra-1.5
http://btcbase.org/log-search?q= ssh-1.99-dopra-1.5

190.39.56.107
http://phuctor.nosuchlabs.com/gpgkey/a15eace4291de6eafa302572f54e054491218af959463e119a212d1f84ead475

197.221.61.38
http://phuctor.nosuchlabs.com/gpgkey/13e82f824b83584c0cec6d9c2d29b4da59e8a469daf84126a264fdd744b8488d

ssh-2.0-openssh_3.8.1p1 debian-8.sarge.4
http://btcbase.org/log-search?q= ssh-2.0-openssh_3.8.1p1 debian-8.sarge.4

197.221.63.150
http://phuctor.nosuchlabs.com/gpgkey/175a4092f61f9c375817e0752e2accbd43e0abd014580bbf6569ec16b36b6eca

200.146.242.241
http://phuctor.nosuchlabs.com/gpgkey/0648ebdeef3f210d6a081115bd29dc916fcc304d6839a0d142993d704eacb182

ssh-2.0-audiocodes
http://btcbase.org/log-search?q= ssh-2.0-audiocodes

201.101.37.44
http://phuctor.nosuchlabs.com/gpgkey/d3936bc56e8f7703f382a67bd36439486558c5e4a13919f1d522a6373ea83ebd

ssh-2.0-openssh_6.0p1 debian-4+deb7u2
http://btcbase.org/log-search?q= ssh-2.0-openssh_6.0p1 debian-4+deb7u2

201.16.189.38
http://phuctor.nosuchlabs.com/gpgkey/58fa3607665fe6e88fedde7fe0c07f9e56d591ca9431e95899d57a5ba2d51ef3

201.249.207.150
http://phuctor.nosuchlabs.com/gpgkey/cda444b217b93bd108b3681b3e46d2f81dde108a156e84e696789db8d3074a06

ssh-1.99-huawei-1.5
http://btcbase.org/log-search?q= ssh-1.99-huawei-1.5

202.166.221.118
http://phuctor.nosuchlabs.com/gpgkey/221218755bb59c166bd88435267638c04f757d5630064ca207d228b4a7520f57

2.116.209.1
http://phuctor.nosuchlabs.com/gpgkey/f7ee9d7418360ebf5222d566b0a5b811023ac29616ebc02a9ee52bdb5a00038a

ssh-1.99-dopra-1.5
http://btcbase.org/log-search?q= ssh-1.99-dopra-1.5

217.57.196.177
http://phuctor.nosuchlabs.com/gpgkey/a558b10a1ccc09194358e0502cafa4415f57f1944dd9fe618e2a2e2d29efac0f

ssh-1.99-dopra-1.5
http://btcbase.org/log-search?q= ssh-1.99-dopra-1.5

217.57.196.179
http://phuctor.nosuchlabs.com/gpgkey/24698ad72475bb28f25ad63cc626a01ec41af82bc51bc4cb8118fc5b15bdf42e

ssh-1.99-dopra-1.5
http://btcbase.org/log-search?q= ssh-1.99-dopra-1.5

223.94.78.217
http://phuctor.nosuchlabs.com/gpgkey/9791cd47ca7c159454ef0ebab5b2cdda613798e4c87012959ada6e8a63949a27

ssh-1.99-comware-5.20
http://btcbase.org/log-search?q= ssh-1.99-comware-5.20

59.21.182.242
http://phuctor.nosuchlabs.com/gpgkey/9bbdeb5651ad779357cc0300d7eba2b94508bd233c3efce605a33732a425a607

ssh-2.0-openssh_5.9
http://btcbase.org/log-search?q= ssh-2.0-openssh_5.9

66.233.213.117
http://phuctor.nosuchlabs.com/gpgkey/f8011333e293b9f0a5f9be238eee6962f9991f66f3fa36cdc317c0680c02d5af

ssh-2.0-openssh_5.2
http://btcbase.org/log-search?q= ssh-2.0-openssh_5.2

68.14.242.210
http://phuctor.nosuchlabs.com/gpgkey/25735c9524851a27c6b6968f1e24b64a6e2d529b5bf16d96f922e1ff96ffedf9

ssh-2.0-openssh_6.6
http://btcbase.org/log-search?q= ssh-2.0-openssh_6.6

71.39.252.162
http://phuctor.nosuchlabs.com/gpgkey/700b8bcb736abb90fbd44cf67f97d08bc607249723dcd55dbc2a7cd36c495d4e

74.45.0.60
http://phuctor.nosuchlabs.com/gpgkey/5c90e36acaf227f40884c95fc6304f9ae04201b80cf895400df9f244788cf79c

ssh-2.0-openssh_4.1
http://btcbase.org/log-search?q= ssh-2.0-openssh_4.1

74.45.228.159
http://phuctor.nosuchlabs.com/gpgkey/986cbe61250486dabcec88d21aebc21e3b49c40f0eb81b86305b3fd41350e0ed

ssh-2.0-openssh_5.2
http://btcbase.org/log-search?q= ssh-2.0-openssh_5.2

74.45.228.160
http://phuctor.nosuchlabs.com/gpgkey/bd93382e8b0ce07c1f76acb19483596e3bdb288b5f9c3848b66566790856981a

ssh-2.0-openssh_5.2
http://btcbase.org/log-search?q= ssh-2.0-openssh_5.2

74.45.228.49
http://phuctor.nosuchlabs.com/gpgkey/422d344b23210cb546373993313b4c67217fdcd2a5b473af0e3d73110f7d1334

ssh-2.0-openssh_5.2
http://btcbase.org/log-search?q= ssh-2.0-openssh_5.2

74.45.228.86
http://phuctor.nosuchlabs.com/gpgkey/8a4251b53531e6f9a0a60e2b75b9256ca8412f7f4fa956f2d46772adb2f890ba

ssh-2.0-openssh_5.2
http://btcbase.org/log-search?q= ssh-2.0-openssh_5.2

74.45.228.97
http://phuctor.nosuchlabs.com/gpgkey/d0ac0c30bc34d89a0030fee5cf3b72aad12a5ca8957eae53a26562a2707ac0bd

ssh-2.0-openssh_5.2
http://btcbase.org/log-search?q= ssh-2.0-openssh_5.2

74.45.229.217
http://phuctor.nosuchlabs.com/gpgkey/883b06e873c07e5b89d390661892df1b8a06b6026a6bbb63475b2e6002ae1e11

ssh-2.0-openssh_5.2
http://btcbase.org/log-search?q= ssh-2.0-openssh_5.2

74.45.231.125
http://phuctor.nosuchlabs.com/gpgkey/bc28a8c915bf048456c5294b50ef4e9d0e032024b46778ff29788cede94d7ea3

ssh-2.0-openssh_5.2
http://btcbase.org/log-search?q= ssh-2.0-openssh_5.2

74.45.231.136
http://phuctor.nosuchlabs.com/gpgkey/1065c2ffa619ae534a1ea8853a33ad9a810557bcefc2f45308ee932b59d47bdc

ssh-2.0-openssh_5.2
http://btcbase.org/log-search?q= ssh-2.0-openssh_5.2

74.45.231.156
http://phuctor.nosuchlabs.com/gpgkey/ea847d018f26a8b10bd14fa05388a71300d259ecbdf38e97f9f842981695f00e

ssh-2.0-openssh_5.2
http://btcbase.org/log-search?q= ssh-2.0-openssh_5.2

78.188.162.184
http://phuctor.nosuchlabs.com/gpgkey/d02c7eb6e3b29fb9d1cd6bc815a0f28c162095115e62cac36d79ad5d587d0910

ssh-2.0-rosssh
http://btcbase.org/log-search?q= ssh-2.0-rosssh

85.14.248.152
http://phuctor.nosuchlabs.com/gpgkey/ee6e84ed0485e5c4615d47e7bf518a35f1a8de60c6dfbbf1f60b1911839726ce

ssh-2.0-openssh_6.0p1 debian-4+deb7u3
http://btcbase.org/log-search?q= ssh-2.0-openssh_6.0p1 debian-4+deb7u3

85.218.41.103
http://phuctor.nosuchlabs.com/gpgkey/c29ea6b1f7d6ad77deba08e41c7c04c88a9c80a2bbda661383959a4dabac776e

ssh-2.0-openssh_5.9
http://btcbase.org/log-search?q= ssh-2.0-openssh_5.9

91.229.251.116
http://phuctor.nosuchlabs.com/gpgkey/50840391e5677882196999c9ae77f3177e6cbf8d35fb4f1fef848cfadf9088b1

ssh-2.0-rosssh
http://btcbase.org/log-search?q= ssh-2.0-rosssh

94.141.150.121
http://phuctor.nosuchlabs.com/gpgkey/674f2eb3301fa29245fea083c0bc505b7b3f7dfd2c80335451217c5cd63ee4f8

ssh-2.0-rosssh
http://btcbase.org/log-search?q= ssh-2.0-rosssh

96.24.7.172
http://phuctor.nosuchlabs.com/gpgkey/7ecdab4f47dc074fd5dd619e8497611c76099101869f1050f59331acb3688182

ssh-2.0-openssh_5.2
http://btcbase.org/log-search?q= ssh-2.0-openssh_5.2
bitcoin http://www.loper-os.org/?cat=42
cold air http://www.loper-os.org/?cat=39
computation http://www.loper-os.org/?cat=4
cryptography http://www.loper-os.org/?cat=45
friends http://www.loper-os.org/?cat=48
mathematics http://www.loper-os.org/?cat=34
nonloper http://www.loper-os.org/?cat=15
philosophy http://www.loper-os.org/?cat=17
softwaresucks http://www.loper-os.org/?cat=23
no comments http://www.loper-os.org/?p=1733#respond
on the matter of brian krebs. http://www.loper-os.org/?p=1719
brian krebs https://archive.is/od6gn
sitting sadly offline https://archive.is/vkrrh
~tb/sec ddos flood. https://archive.is/gqsdd
reason http://cluborlov.blogspot.com/2016/07/the-power-of-nyet.html
gauleiters http://research.calvin.edu/german-propaganda-archive/gauleiter.htm
shipped, bound and gagged, to american prisons. http://www.reuters.com/article/us-usa-cyber-guccifer-iduskcn0wy5mk
forcefeeding https://archive.is/neuyt
artfully sabotaging open source software http://www.loper-os.org/?p=1299
mahmood khadeer bombshell http://qntra.net/2016/08/phuctor-finds-seven-keys-produced-with-null-rng-and-other-curiosities/
discoveries http://phuctor.nosuchlabs.com/phuctored
krebs was taken under the wing https://krebsonsecurity.com/2016/09/the-democratization-of-censorship
google’s “project shield” https://projectshield.withgoogle.com/public/
the internet of the future http://www.loper-os.org/?p=208
schneier http://trilema.com/2013/why-i-suspect-schneier-is-an-us-agent/
no accident. http://trilema.com/2014/heres-why-we-dont-like-how-the-world-currently-works/
who profit handsomely from it. http://btcbase.org/log/2014-02-13#499311
found http://phuctor.nosuchlabs.com/faq
tip of the birthday theorem iceberg http://btcbase.org/log/2016-09-02#1533642
chumpatronics http://www.loper-os.org/?cat=47
cryptography http://www.loper-os.org/?cat=45
distractions http://www.loper-os.org/?cat=6
hot air http://www.loper-os.org/?cat=8
philosophy http://www.loper-os.org/?cat=17
softwaresucks http://www.loper-os.org/?cat=23
5 comments http://www.loper-os.org/?p=1719#comments
a complete pill for the sage smartprobe. http://www.loper-os.org/?p=1667
note: please read the faq!!! http://www.loper-os.org/?p=1887
amd http://btcbase.org/log-search?q=amd
- http://www.loper-os.org/pub/sage/sage_and_gb.jpg
sage eng. llc, it appears, is long dead. https://web.archive.org/web/20150813213858/http://www.se-eng.com/2015/07/so-long-and-thanks-for-all-the-fish/
coreboot https://www.coreboot.org/
whatever other attempts at sane utilization of x86-64 iron http://btcbase.org/log/2016-09-18#1544581
- http://www.loper-os.org/pub/sage/front_s.jpg
- http://www.loper-os.org/pub/sage/test_points.jpg
openocd http://openocd.org/
this gdb script http://www.loper-os.org/pub/sage/instr_trace.gdb
sage_pill.py
(sha256: 2f9ce44fe069705a7ee83c0f4c733a6a0cc374613429c5c1f47a8481aa464b60)
http://nosuchlabs.com/pub/sage_pill.py
sage_last_public_fw.tar.gz
(sha256: 30c005febfbff531a2b9d06ef8c2c41fedb2c8993a2992a373fbeb66900fbaf8)
http://nosuchlabs.com/pub/sage_last_public_fw.tar.gz
here. http://www.loper-os.org/?p=1821
cold air http://www.loper-os.org/?cat=39
computation http://www.loper-os.org/?cat=4
hardware http://www.loper-os.org/?cat=7
nonloper http://www.loper-os.org/?cat=15
photo http://www.loper-os.org/?cat=37
softwarearchaeology http://www.loper-os.org/?cat=43
no comments http://www.loper-os.org/?p=1667#respond
tears of the phucked. http://www.loper-os.org/?p=1662
- http://www.loper-os.org/pub/hc.jpg
phuctor http://phuctor.nosuchlabs.com
april http://www.loper-os.org/?p=1639
a scan of the complete ipv4 space http://btcbase.org/log/2016-06-14#1482779
breaking http://phuctor.nosuchlabs.com/gpgkey/50840391e5677882196999c9ae77f3177e6cbf8d35fb4f1fef848cfadf9088b1
a ‘websense’ censortron control panel, apparently http://www.websense.com/support/article/kbarticle/how-can-i-get-more-information-about-my-policy-from-the-block-page
a little bit too late http://qntra.net/2016/04/phuctor-the-rsa-super-collider-discovers-vulnerability-in-northrop-grumman-pgp-root-ca
it is merely one of the public whipping posts http://phuctor.nosuchlabs.com/faq
cold air http://www.loper-os.org/?cat=39
computation http://www.loper-os.org/?cat=4
cryptography http://www.loper-os.org/?cat=45
friends http://www.loper-os.org/?cat=48
mathematics http://www.loper-os.org/?cat=34
nonloper http://www.loper-os.org/?cat=15
softwaresucks http://www.loper-os.org/?cat=23
no comments http://www.loper-os.org/?p=1662#respond
terraforming the “mycloud mini” : tty. http://www.loper-os.org/?p=1644
“mycloud mini” http://www.frostyplace.com/index.php?story_id=11202
pogoplug http://btcbase.org/log-search?q=pogo
- http://www.loper-os.org/pub/mycloud_mini_tty.jpg
bitcoin http://www.loper-os.org/?cat=42
cold air http://www.loper-os.org/?cat=39
hardware http://www.loper-os.org/?cat=7
nonloper http://www.loper-os.org/?cat=15
2 comments http://www.loper-os.org/?p=1644#comments
« previous http://www.loper-os.org/?paged=2
bitcoin http://www.loper-os.org/?cat=42
books http://www.loper-os.org/?cat=3
chumpatronics http://www.loper-os.org/?cat=47
cold air http://www.loper-os.org/?cat=39
computation http://www.loper-os.org/?cat=4
copyright http://www.loper-os.org/?cat=5
cryptography http://www.loper-os.org/?cat=45
distractions http://www.loper-os.org/?cat=6
friends http://www.loper-os.org/?cat=48
hardware http://www.loper-os.org/?cat=7
hot air http://www.loper-os.org/?cat=8
idea http://www.loper-os.org/?cat=9
lisp http://www.loper-os.org/?cat=33
lispmachine http://www.loper-os.org/?cat=10
loperos http://www.loper-os.org/?cat=11
mathematics http://www.loper-os.org/?cat=34
memory http://www.loper-os.org/?cat=12
mit http://www.loper-os.org/?cat=13
modestproposal http://www.loper-os.org/?cat=14
nonloper http://www.loper-os.org/?cat=15
papers http://www.loper-os.org/?cat=16
philosophy http://www.loper-os.org/?cat=17
photo http://www.loper-os.org/?cat=37
physics http://www.loper-os.org/?cat=18
predictions http://www.loper-os.org/?cat=36
progress http://www.loper-os.org/?cat=19
reactions http://www.loper-os.org/?cat=31
shouldersgiants http://www.loper-os.org/?cat=21
softwarearchaeology http://www.loper-os.org/?cat=43
softwaresucks http://www.loper-os.org/?cat=23
symbolics http://www.loper-os.org/?cat=24
uncategorized http://www.loper-os.org/?cat=1
intro: part i http://www.loper-os.org/?p=4
intro: part ii http://www.loper-os.org/?p=8
no such labs http://nosuchlabs.com
phuctor http://phuctor.nosuchlabs.com
therealbitcoin http://therealbitcoin.org
tmsr http://trilema.com/2016/how-to-participate-in-the-affairs-of-the-most-serene-republic/
abstract heresies http://funcall.blogspot.com/
angry unix programmer http://pages.cs.wisc.edu/~psilord/blog/
arcane sentiment http://arcanesentiment.blogspot.com
axis of eval http://axisofeval.blogspot.com/
blogdial http://irdial.com/blogdial
chris harrison http://www.chrisharrison.net/projects/research.html
dmitry orlov http://cluborlov.blogspot.com/
don lancaster http://www.tinaja.com/
doron zeilberger http://www.math.rutgers.edu/~zeilberg/pj.html
erik naggum http://www.xach.com/naggum/articles/
freedom to tinker http://www.freedom-to-tinker.com/
frozenlock http://frozenlock.org
greg egan http://gregegan.customer.netspace.net.au
ignorantguru https://igurublog.wordpress.com
ilkka kokkarinen http://fourthcheckraise.blogspot.com/
imagine27 http://jng.imagine27.com/
irreal http://irreal.org/blog/
john walker http://www.fourmilab.ch/
lambda the ultimate http://lambda-the-ultimate.org/
lemonodor http://lemonodor.com/
lichtblau http://lichteblau.blogspot.com/
lispian http://lispian.net/
micro_research http://1010.co.uk/
mircea popescu http://trilema.com
moron lab http://moronlab.blogspot.com/
neil dickson http://ndickson.wordpress.com/
pascal costanza http://p-cos.blogspot.com/
peter woit http://www.math.columbia.edu/~woit/wordpress/
philip greenspun http://philip.greenspun.com/
richard gabriel http://www.dreamsongs.com/
richard kulisz http://richardkulisz.blogspot.com/
roly perera http://dynamicaspects.org/blog/index.html
scott locklin http://scottlocklin.wordpress.com/
shtetl-optimized http://www.scottaaronson.com/blog/
steve dutch http://www.uwgb.edu/dutchs/pscindx.htm
structural insight http://fexpr.blogspot.com/
ted nelson http://ted.hyperland.com/
terence tao http://terrytao.wordpress.com/
terry davis http://www.templeos.org/
theodore gray http://www.theodoregray.com/
uncle al http://www.mazepath.com/uncleal/
unenumerated http://unenumerated.blogspot.com/
unqualified reservations http://unqualified-reservations.blogspot.com/
xah lee http://xahlee.org/pagetwo_dir/more.html
bitcoin, or how to hammer in nails with a microscope. http://www.loper-os.org/?p=939
don’t blame the mice http://www.loper-os.org/?p=1299
engelbart’s violin http://www.loper-os.org/?p=861
going nowhere really fast, or how computers only come in two speeds. http://www.loper-os.org/?p=300
no formats, no format wars. http://www.loper-os.org/?p=309
non-apple’s mistake http://www.loper-os.org/?p=132
steam lisp http://www.loper-os.org/?p=388
stierlitz, the fearless, driver-less bus analyzer. http://www.loper-os.org/?p=702
the wisdom of erik naggum http://www.loper-os.org/?p=165
thumbs down for clojure http://www.loper-os.org/?p=42
where lisp fails: at turning people into fungible cogs. http://www.loper-os.org/?p=69
why hypercard had to die http://www.loper-os.org/?p=568
ezotgdbg https://github.com/asciilifeform/ezotgdbg
stierlitz https://github.com/asciilifeform/stierlitz
badatentropy http://www.loper-os.org/bad-at-entropy/manmach.html
microwriter emulator http://www.loper-os.org/mwemu/mwemu.html
lmkbd https://code.google.com/p/lmkbd/source/browse/#svn/trunk
paralleleye http://www.loper-os.org/vintage/paralleleye/eye.html
parasid http://www.loper-os.org/vintage/parallelsid/parasid.html
may 2017 http://www.loper-os.org/?m=201705
january 2017 http://www.loper-os.org/?m=201701
october 2016 http://www.loper-os.org/?m=201610
september 2016 http://www.loper-os.org/?m=201609
july 2016 http://www.loper-os.org/?m=201607
june 2016 http://www.loper-os.org/?m=201606
april 2016 http://www.loper-os.org/?m=201604
march 2016 http://www.loper-os.org/?m=201603
december 2015 http://www.loper-os.org/?m=201512
october 2015 http://www.loper-os.org/?m=201510
august 2015 http://www.loper-os.org/?m=201508
may 2015 http://www.loper-os.org/?m=201505
june 2014 http://www.loper-os.org/?m=201406
april 2014 http://www.loper-os.org/?m=201404
march 2014 http://www.loper-os.org/?m=201403
january 2014 http://www.loper-os.org/?m=201401
december 2013 http://www.loper-os.org/?m=201312
november 2013 http://www.loper-os.org/?m=201311
october 2013 http://www.loper-os.org/?m=201310
september 2013 http://www.loper-os.org/?m=201309
july 2013 http://www.loper-os.org/?m=201307
may 2013 http://www.loper-os.org/?m=201305
april 2013 http://www.loper-os.org/?m=201304
february 2013 http://www.loper-os.org/?m=201302
january 2013 http://www.loper-os.org/?m=201301
october 2012 http://www.loper-os.org/?m=201210
september 2012 http://www.loper-os.org/?m=201209
august 2012 http://www.loper-os.org/?m=201208
june 2012 http://www.loper-os.org/?m=201206
may 2012 http://www.loper-os.org/?m=201205
april 2012 http://www.loper-os.org/?m=201204
march 2012 http://www.loper-os.org/?m=201203
february 2012 http://www.loper-os.org/?m=201202
january 2012 http://www.loper-os.org/?m=201201
december 2011 http://www.loper-os.org/?m=201112
november 2011 http://www.loper-os.org/?m=201111
october 2011 http://www.loper-os.org/?m=201110
july 2011 http://www.loper-os.org/?m=201107
may 2011 http://www.loper-os.org/?m=201105
april 2011 http://www.loper-os.org/?m=201104
march 2011 http://www.loper-os.org/?m=201103
january 2011 http://www.loper-os.org/?m=201101
november 2010 http://www.loper-os.org/?m=201011
september 2010 http://www.loper-os.org/?m=201009
august 2010 http://www.loper-os.org/?m=201008
july 2010 http://www.loper-os.org/?m=201007
june 2010 http://www.loper-os.org/?m=201006
april 2010 http://www.loper-os.org/?m=201004
march 2010 http://www.loper-os.org/?m=201003
february 2010 http://www.loper-os.org/?m=201002
january 2010 http://www.loper-os.org/?m=201001
december 2009 http://www.loper-os.org/?m=200912
october 2009 http://www.loper-os.org/?m=200910
september 2009 http://www.loper-os.org/?m=200909
august 2009 http://www.loper-os.org/?m=200908
july 2009 http://www.loper-os.org/?m=200907
june 2009 http://www.loper-os.org/?m=200906
may 2009 http://www.loper-os.org/?m=200905
march 2009 http://www.loper-os.org/?m=200903
february 2009 http://www.loper-os.org/?m=200902
january 2009 http://www.loper-os.org/?m=200901
december 2008 http://www.loper-os.org/?m=200812
september 2008 http://www.loper-os.org/?m=200809
august 2008 http://www.loper-os.org/?m=200808
july 2008 http://www.loper-os.org/?m=200807
june 2008 http://www.loper-os.org/?m=200806
may 2008 http://www.loper-os.org/?m=200805
february 2008 http://www.loper-os.org/?m=200802
january 2008 http://www.loper-os.org/?m=200801
december 2007 http://www.loper-os.org/?m=200712
november 2007 http://www.loper-os.org/?m=200711
log in http://www.loper-os.org/wp-login.php

Zdjęcia

Zdjęcia 17
Zdjęcia bez atrybutu ALT 15
Zdjęcia bez atrybutu TITLE 0
Korzystanie Obraz ALT i TITLE atrybutu dla każdego obrazu.

Zdjęcia bez atrybutu TITLE

empty

Zdjęcia bez atrybutu ALT

http://www.loper-os.org/pub/mb1.png
http://www.loper-os.org/pub/mobo/sad_cap_1.jpg
http://www.loper-os.org/pub/mobo/sad_cap_2.jpg
http://www.loper-os.org/pub/mobo/pb_free.jpg
http://www.loper-os.org/pub/mobo/temp.jpg
http://www.loper-os.org/pub/mobo/materials.jpg
http://www.loper-os.org/pub/mobo/iron.jpg
http://www.loper-os.org/pub/mobo/cap_leads.jpg
http://www.loper-os.org/pub/mobo/happy_cap_1.jpg
http://www.loper-os.org/pub/mobo/happy_cap_2.jpg
http://www.loper-os.org/pub/ycombinator_eagerly_eats_nsa_shit.png
http://www.loper-os.org/pub/sage/sage_and_gb.jpg
http://www.loper-os.org/pub/sage/front_s.jpg
http://www.loper-os.org/pub/ng.png
http://www.loper-os.org/pub/mycloud_mini_tty.jpg

Ranking:


Alexa Traffic
Daily Global Rank Trend
Daily Reach (Percent)









Majestic SEO











Text on page:

loper os "you can't get to the moon by piling up chairs." home about loper os guiding principles rss feed contact pgp « previous sage smartprobe faq published on: sunday may 07 2017 what’s a sage smartprobe? see previous articles, a complete pill for the sage smartprobe. the care and feeding of the sage smartprobe. where do i get a sage smartprobe? possibly here — while supplies last. (warning: i have no relation with this vendor and have no idea whether they still include the probe with “gizmo 1″ kit. i do know for a fact that their latest “gizmo 2″ product does not include it.) smartprobe is no longer made and at some point will only be available secondhand. who is selling devices comparable to smartprobe ? afaik nobody! several vendors offer similar products but they do not support plain old gdb interface, and instead require you to buy multi-thousand-$ ms windows closed shitware — sometimes with a mandatory maintenance contract ! can anyone help me with sage_pill.py? when i run it, it gets through programming the fpga, but then dies… this is the correct behaviour. the probe resets itself after it is cured by the pill and your serial connection to it will break. how do i verify that the pill worked? screen /dev/ttyacm0 (or wherever your probe is connected) and hit return key a few times. you will see the string smartprobe: 3.2_3743 (the last firmware revision released before the manufacturer went out of business.) and your probe will no longer die after n hours of use. do you have a pill for the sage edk software? the edk is rubbish, java shitware, forget about it; use plain old gdb. i got gdb working with the probe, but i can’t seem to get the probe to work with the board. if i plug in the probe to the board, the board hangs. if i try to continue i just get a bunch of ffffffs. if i do “monitor run” it says the probe is not connected ? you plugged the cable into your motherboard backwards! help! gdb does strange things instead of working ! you must use version 7.8 of gdb or above, for the probe to work. earlier versions had problems with the switches between 16, 32, and 64-bit modes of the amd cpu. will sage smartprobe work with a pcengines apu1 computer ? yes. though you will have to solder the debug connector on yourself. (it is a 5 minute job. the header is a metric-spaced one, however, make sure to buy the right kind.) will sage smartprobe work with the recently-released pcengines apu2 computer ? no! on account of amd’s psp nsa-mandated fritz chip. does the sage smartprobe work with intel cpu and motherboard? no. will you help me with intel’s xdp debugger for intel cpu and motherboard? no. why did sage go out of business? i don’t know. but amd’s successful campaign of docs-withholding, stonewalling, and fritz-chipping, to strangle coreboot — probably did not help sage’s life expectancy. sage was a consultancy mainly specializing in coreboot and custom third-party bios work. were you affiliated with sage? can you put me in touch with ex-sage people ? no. and no. i have questions! try asking — politely — here. posted in: cold air, computation, hardware, nonloper, softwarearchaeology by stanislav no comments practical lead to gold conversion; or an intro to opteron resurrection. published on: tuesday january 31 2017 it so happens that amd resisted the informal nsa ban on the manufacture of linuxbios-capable x86 cpus slightly longer than intel did. or perhaps they were simply slower to succumb to microsoft’s fritz chip decree. whichever may be the case, vintage (pre-2011, with some caveats, inquire within) amd opteron motherboards are a precious and increasingly scarce non-renewable resource. is it possible to prolong the life of these devices? and when they finally die, to bring them back to life? turns out, in some cases, the answer is yes! our patient today is a tyan s2915 with nearly 11 years of continuous service. a true champ — but the sad day came: it would not come back up after a scheduled reboot; then, a week later, already staring at the dumpster, it deigned to switch on if “asked nicely”, sporadically. the culprit, in this case, was the same as in nearly every other “smoked” mobo: aluminum electrolytic caps. but which? one useful fact to remember: wet-electrolytic capacitors age in direct proportion to temperature. so we take a cheap thermal camera: and, unsurprisingly, we find a bulging and slightly-leaky electrolytic near the hot (~80c, if running on a desk, 70c or so in well-ventilated case) northbridge: and another, similarly-sad one near the pci-e slot where the video card was mounted: now, this board is a vintage one, but unfortunately the lead-free solder scam was already in full swing at the time it was made: and so what would otherwise have been a kindergarten-level repair job — desoldering and replacing two large capacitors — turns into a somewhat tricky and quite time-consuming exercise. even setting the iron to its maximum temperature (~250c): … i found that the solder on the leads would not visibly begin to melt at all ! the melting point of pb-free solder is considerably higher (how much higher — varies, by particular composition) than of traditional alloys, and a commonplace adjustable soldering iron simply will not work. (and if you were to use a specially-made, hotter iron, you would quite possibly damage the surrounding tracks on the pcb.) so now let’s try a cheap but effective pill against the eurocrat idiocy. we take a tube of good, old-fashioned pre-ban leaded solder, some wick, new capacitors: now add leaded solder, repeatedly, then wick it away. again, and again. we end up slowly adding lead to the alloy until the melting point is manageable. it took me four shots of this, per capacitor leg, before either of the two sad caps would budge. now it is possible to install the new ones: and we’re back in business! here’s to another 11 years, old friend. posted in: cold air, computation, hardware, nonloper, photo, physics by stanislav 1 comment still tenser, said the censor. published on: monday october 03 2016 stay classy, ycombinator. posted in: chumpatronics, cryptography, hot air, nonloper, philosophy, softwaresucks by stanislav 2 comments the care and feeding of the sage smartprobe. published on: saturday october 01 2016 note: please read the faq!!! if you cured your sage smartprobe of its congenital disease as per the last article on the subject, you may now be wondering what to do with it. the vendor supplied a massive java shitware with the thing, which does not merit any discussion whatsoever. instead, we will use the probe’s very spiffy gdb-compatible interface. configure your gdb as follows: gdbinit.txt: ### log all instructions set logging on set logging file gdb_out.txt ### only if you want to see the raw gdb packets... #set debug remote 1 ### if you're debugging the bios set architecture i386 ### if you are debugging a warmed-up os # set architecture i386:x86-64 ### where the probe is: target remote /dev/ttyacm0 ### or, if it is connected to your lan, ### let's say at 192.168.1.111, # target remote 192.168.1.111:2159 # show instructions on single-step set disassemble-next-line on # disable evil, heretical gas syntax #set disassembly-flavor intel ### if you want the ncurses gui in gdb # layout asm so, for instance, let’s connect to a freshly-booted amd g-series box spinning in coreboot’s boot selector menu, $ gdb --command=gdbinit.txt gnu gdb (gentoo 7.8.1 vanilla) 7.8.1 copyright (c) 2014 free software foundation, inc. license gplv3+: gnu gpl version 3 or later this is free software: you are free to change and redistribute it. there is no warranty, to the extent permitted by law. type "show copying" and "show warranty" for details. this gdb was configured as "x86_64-pc-linux-gnu". type "show configuration" for configuration details. for bug reporting instructions, please see: . find the gdb manual and other documentation resources online at: . for help, type "help". type "apropos word" to search for commands related to "word". the target architecture is assumed to be i386 (gdb) si 0x001015ae in ?? () => 0x001015ae: c3 ret (gdb) 0x001035a9 in ?? () => 0x001035a9: 29 f0 sub %esi,%eax (gdb) 0x001035ab in ?? () => 0x001035ab: 19 fa sbb %edi,%edx (gdb) 0x001035ad in ?? () => 0x001035ad: 39 ea cmp %ebp,%edx (gdb) 0x001035af in ?? () => 0x001035af: 72 f3 jb 0x1035a4 (gdb) 0x001035b1 in ?? () => 0x001035b1: 77 04 ja 0x1035b7 (gdb) 0x001035b3 in ?? () => 0x001035b3: 39 d8 cmp %ebx,%eax (gdb) 0x001035b5 in ?? () => 0x001035b5: 72 ed jb 0x1035a4 (gdb) 0x001035b7 in ?? () => 0x001035b7: 83 c4 0c add $0xc,%esp (gdb) 0x001035ba in ?? () => 0x001035ba: 5b pop %ebx (gdb) c continuing. ^c program received signal sigtrap, trace/breakpoint trap. 0x001035b5 in ?? () => 0x001035b5: 72 ed jb 0x1035a4 (gdb) q a debugging session is active. inferior 1 [remote target] will be killed. quit anyway? (y or n) y i will add that the probe also works great with ida pro’s gdb interface. or whatever other, similar front-end you might fancy. but! in order to make proper use of the probe, you will need the vendor-specific command set for manipulating the dc power, pci bus, jtag chain, and so forth. these were at one point published on the vendor’s site, which has vanished without a trace. i have made a cleaned-up html version: sage smartprobe gdb command manual. note that i have discovered certain undocumented commands. these will be the subject of a later article! posted in: cold air, computation, hardware, nonloper, shouldersgiants, softwarearchaeology, softwaresucks by stanislav 3 comments how to make your own lamport parachute from common household materials. published on: wednesday september 28 2016 the thought began, as many good things begin, in #trilema. users of the wot, of v, and other systems where your cryptographic identity is wholly in your own hands1 live with a certain risk of “cryptographic death” – i.e. the compromise of one’s signing key. a conscientious user of public key crypto might keep the thought of this calamity somewhere in the back of his head, filed right next to “piano falling on my head” and other misfortunes from which there can be no return. a correctly-generated rsa key is unlikely to be broken via cryptoanalytic means within the owner’s lifetime. but “never say never!” and there is always the possibility of a mass slaughter of keys, a “cryptocalypse”, where the public key cryptosystem of your choice is broken (or, via whatever mathematical advances, weakens, and the cost of deriving your private key from your public key becomes tractably low.) the popular notion of key revocation is a questionable business because it attempts to impose a political structure onto an uncooperative mathematical reality — in the jargon of #trilema, it is “promisetronic, not protocolic.” someone who takes possession of your signing key can walk around and befoul your reputation, ‘who steals my purse steals trash; ’tis something, nothing; ‘twas mine, ’tis his, and has been slave to thousands; but he that filches from me my good name…’ without regard to time or space – he can sign whatever he likes and attribute it to you. and those who have not received your revocation signal will accept the forgeries as the genuine article. nothing whatsoever can be done to rescue a compromised signing key. but might it be possible to rescue its owner from wot death by establishing an unforgeable continuity of identity ? the answer is: “possibly.” the bitcoin blockchain2 gives us a very strong mechanism for cryptographic timestamping3 – i.e. the act of certifying, to a skeptical observer, that some particular string of bits had indeed been in existence at a particular point in time. the current state-of-the-art implementation of this concept is called deedbot, and the reader is invited to become familiar with it. if you make an arrangement with your associates in advance that a certain public key deedbotted at a certain time is to be regarded as your emergency fallback, you have a kind of “parachute” on which you may conceivably float safely to the ground in the event of your plane’s wings, if you will, breaking off — i.e. a signing key compromise.4 however, the obvious caveat is that the “parachute” keypair must exist at the time of the deedbotting, and its public key must be, well, public. this can be a problem in the scenario where the cryptosystem itself- e.g., rsa – is publicly broken. the enemy can now do as he pleases with your primary and fallback keys, and you – the cryptographic you – have died a permanent death. and all known public key signature schemes rely on unproven5 number-theoretic conjectures, and may conceivably fall this very night. all except for one… l. lamport’s 1979 “one time signature” algorithm rests on no number-theoretic conjecture, but merely on the strength of a collision-resistant hash of the operator’s choosing. on account of certain disadvantages which will soon become apparent to the reader, it is used virtually nowhere. but it so happens that it is entirely perfect for our “parachute” scenario. a complete and usable implementation of this “lamport parachute” is presented in this article. it is written in 68 69 lines of bash and makes use strictly of commonplace userland utilities, such as may be met with on a typical linux box. this somewhat strange choice of implementation language (it certainly does not shine, for instance, speedwise) is deliberate: the user is expected to understand each individual part, so that the function of the whole becomes unambiguously apparent, like 2+2. as the field of cryptography is slowly reconquered from the schneiers and other scumbags presently maggoting on top of it, expect this type of didactic presentation to become ordinary practice. a lamport public key consists of two lists, let’s call them a and b, of randomly-generated bitstrings that have been hashed with a collision-resistant hash and thereafter published. to make use of such a key, the owner hashes the payload being signed, and for each bit that is equal to 0 in the resulting hash, reveals the original pre-hash string from column a, whereas if it is equal to 1 he reveals a pre-hash string from column b. for reasons which i hope are quite obvious to the alert reader, a lamport public key is to be made use of only once. and such a key is quite bulky, as is the signature resulting from its use.6 but enough words! it is time for the deeds! we shall generate7 our lamport parachute like this: lamport_mkpriv.sh #!/bin/bash if [ $# -lt 2 ] then echo "usage: ./`basename $0` payloadbits strengthbits" exit 1 fi for i in $(seq 1 $(($1 * 2))) ; do echo `od -n $(($2 / 8)) -an -t x1 -v /dev/random | tr -d " \n"` ; done | xargs -n 2 all this does is to give us two columns of strengthbits-sized random integers, times payloadbits rows. specifically: $ ./lamport_mkpriv.sh 256 512 > privkey.txt this will create a parachute private key suitable for use with sha256 – i.e. it is able to sign a 256-bit payload. the strength – or length of the random strings – in this example is 512 bits. it is pointlessly suicidal to use a strength value below the output length of your chosen hash algorithm, but otherwise the choice is unconstrained, so long as it byte-aligns.8 now we would like to generate the corresponding public key: lamport_priv2pub.sh #!/bin/bash if [ $# -lt 1 ] then echo "usage: ./`basename $0` hashutil < privkey.txt > pubkey.txt" exit 1 fi for x in $(cat) ; do echo -n $x | xxd -r -p | $1 | cut -d ' ' -f1 ; done | xargs -n 2 we simply apply the hashutil of choice to the bitstrings produced by lamport_mkpriv.sh. and it is done like this: $ ./lamport_priv2pub.sh sha256sum < privkey.txt > pubkey.txt now we have the public key. if you are generating a “battlefield”9 key, it is now time to consider its intended usage scenario. if the payload of the signature is known in advance – e.g., a “warrant canary”, or some other such thing – you will generate its signature immediately, and the private key may then be destroyed immediately.10 otherwise the private key is to be retained, shielded stegatronically from prying eyes, and hidden safely far away from your usual places of business or habitation, or other locations liable to be searched by the enemy. let’s make a second public/private keypair of the same type: $ ./lamport_mkpriv.sh 256 512 > another_privkey.txt $ ./lamport_priv2pub.sh sha256sum < another_privkey.txt > another_pubkey.txt and now we should like to make use of our lamport parachute. let’s sign a message: lamport_encode.sh #!/bin/bash if [ $# -lt 1 ] then echo "usage: ./`basename $0` privkey.txt < hexpayload > encoded.txt" exit 1 fi payload=$(cat | tr '[:lower:]' '[:upper:]') len=$((${#payload} * 4)) bits=$(printf "%*s" $len $(echo "ibase=16;obase=2;$payload" | bc | tr -d '\\\n') | tr ' ' 0) while ifs= read -r p; do bit=${bits:0:1}; bits=${bits:1}; echo $p | cut -d ' ' -f$(($bit + 1)); done < "$1" here we simply iterate over the bits of the payload, choosing the unhashed original private strings from column a or b as discussed earlier. remember, we generated a private key that can carry a 256-bit payload. it does not necessarily have to be a hash, but in this example we will take one, e.g.: $ echo "attack at dawn." | sha256sum | cut -d ' ' -f1 1d6c270d7cc7e82a816ffb7bc3797d213b24d9d17af48f4b3b8d01fb43ed15c3 echo "attack at dawn." | sha256sum | cut -d ' ' -f1 | ./lamport_encode.sh privkey.txt > encoded.txt and we get a signature. now you must destroy the private key! it shall never be used again! quite analogously to a vernam "one time pad" -- the re-use of a lamport private key is cryptographically suicidal. and now some counterparty, with whom you have taken care to share your parachute's public key, wishes to verify the signature. it happens like this: lamport_decode.sh #!/bin/bash if [ $# -lt 2 ] then echo "usage: ./`basename $0` hashutil pubkey.txt < encoded.txt > hexpayload" exit 1 fi bits="" while read -u 3 pkl; do if ! read el then break fi bits="$bits$( case $(echo -n $el | xxd -r -p | $1 | cut -d ' ' -f1) in $(echo $pkl | cut -d ' ' -f1)) echo "0" ;; $(echo $pkl | cut -d ' ' -f2)) echo "1" ;; *) exit 1; break ;; esac)" if [[ $? == 1 ]] then echo false >&2; exit 1 fi done 3< $2 padlen=$(od -n 1 /dev/zero | $1 | cut -d ' ' -f1 | tr -d " \n" | wc -c) printf "%*s\n" $padlen $(echo "ibase=2;obase=10000;$bits" | bc | tr -d '\\\n' | tr '[:upper:]' '[:lower:]') | tr ' ' 0 here we simply take each bitstring from an encoded parachute message (the signature) -- hash it with the pre-agreed hashing algo; and determine which column of each respective row of the public key the result is found in. (if the answer is "neither", the decoder terminates and warns us.) so, for instance: $ ./lamport_decode.sh sha256sum pubkey.txt < encoded.txt 1d6c270d7cc7e82a816ffb7bc3797d213b24d9d17af48f4b3b8d01fb43ed15c3 we have decoded a payload. if we had agreed, in advance, that this payload is the sha256 hash of a document, e.g.: $ diff < (./lamport_decode.sh sha256sum pubkey.txt < encoded.txt) <(echo "attack at dawn." | sha256sum | cut -d ' ' -f1) we are able to verify it. now let's try the same, but with the wrong public key: $ diff < (./lamport_decode.sh sha256sum another_pubkey.txt < encoded.txt) <(echo "attack at dawn." | sha256sum | cut -d ' ' -f1) false 0a1 > 1d6c270d7cc7e82a816ffb7bc3797d213b24d9d17af48f4b3b8d01fb43ed15c3 observe that it is possible to make use of any hashing algorithm11 you may happen to like, so long as you have it available as a command-line program. epilogue. a v-genesis for these didactic examples is available12 here; seal - here.. as opposed to... the other kind. where your self-appointed masters could impersonate you at their leisure if they so choose. ↩ there exists, and can exist, precisely one blockchain. ↩ all other cryptographic timestamp schemes currently known rely on a "trusted third party." and a sane user trusts "third parties" no further than he can throw them! ↩ if it so happens that you learn of your private key having been compromised before the consequences become irreparably grave, you should consider yourself extraordinarily lucky. just ask, e.g., admiral isoroku yamamoto. ↩ the "hardness" -- i.e. the amount of computation required to break an rsa key, of whatever length, is unknown. and if your university professor taught you that it is known, or -- more egregiously -- that "it is equivalent to integer-factoring", then he is not merely an ignoramus but a particular kind of liar. ↩ there exist certain questionable schemes to somewhat reduce this bulk, but i have deliberately eschewed them in light of the gravity of the task at hand. good men may well die from your "reasonable" optimizations, your "negligible" losses of strength, loathesome hucksters. ↩ chances are that lamport key generation, being an entropy-hungry affair, will take an unacceptably long time on your box. the temptation to replace "/dev/random" with "/dev/urandom" will be great. needless to say that if the key is being generated for battlefield use, such a substitution is impermissible. but if you are following along simply for study, go ahead. just remember to switch it back before crafting that missile launch key... ↩ i.e. a multiple of 8. ↩ i.e. for use in practice. ↩ along, if your situation is sufficiently grave to merit this, you will also cremate the very machine used in these operations! ↩ one interesting tidbit is that public key signatures are only possible if trapdoor functions exist -- see rompel, 1990. so, today, or 100 years from now, you're stuck choosing a hash algo. ↩ strictly under popescu's license. ↩ posted in: bitcoin, cold air, computation, cryptography, friends, idea, mathematics, nonloper, papers, philosophy, shouldersgiants, softwarearchaeology, softwaresucks, uncategorized by stanislav 10 comments phuctored ssh public keys. published on: friday september 23 2016 phuctored ssh public keys to date. keys were obtained from a scan of the complete ipv4 space. we have gone approximately 20% of the way through the data set at the time of this writing. click on the ip addresses to view a key in phuctor, or on the ssh hello string to view pertinent discussions. a snapshot of all phuctored keys at the time of writing can be viewed here, if the main site is slow under load. (feel free to ask questions !) ip ssh hello ssl hello 112.16.4.21 ssh-1.99-comware-5.20 112.16.65.245 112.16.65.247 112.16.95.66 ssh-1.99-rgos_ssh_1.0 177.234.0.97 ssh-1.99-huawei-1.5 177.234.11.229 ssh-1.99-huawei-1.5 177.234.13.179 ssh-1.99-dopra-1.5 177.234.13.241 ssh-1.99-huawei-1.5 177.234.15.27 177.234.1.73 ssh-1.99-huawei-1.5 177.234.1.91 ssh-1.99-dopra-1.5 177.234.4.97 ssh-1.99-huawei-1.5 177.234.6.21 ssh-1.99-huawei-1.5 177.234.9.13 ssh-1.99-huawei-1.5 183.246.69.24 ssh-1.99-comware-5.20 187.188.126.28 187.72.155.221 ssh-2.0-audiocodes subject=/cn=acl_3353352 187.72.216.78 ssh-2.0-audiocodes subject=/cn=acl_3353177 189.112.138.254 189.203.181.149 ssh-1.99-dopra-1.5 189.203.181.7 ssh-1.99-dopra-1.5 189.203.72.147 ssh-1.99-dopra-1.5 190.39.56.107 197.221.61.38 ssh-2.0-openssh_3.8.1p1 debian-8.sarge.4 197.221.63.150 200.146.242.241 ssh-2.0-audiocodes subject=/cn=acl_3348823 201.101.37.44 ssh-2.0-openssh_6.0p1 debian-4+deb7u2 201.16.189.38 201.249.207.150 ssh-1.99-huawei-1.5 subject=/name=ar157-self-signed-certificate-210235384810e4001320 202.166.221.118 2.116.209.1 ssh-1.99-dopra-1.5 217.57.196.177 ssh-1.99-dopra-1.5 217.57.196.179 ssh-1.99-dopra-1.5 223.94.78.217 ssh-1.99-comware-5.20 59.21.182.242 ssh-2.0-openssh_5.9 subject=/c=us/st=california/l=sunnyvale/o=aerohive/ou=default/cn=hiveap 66.233.213.117 ssh-2.0-openssh_5.2 68.14.242.210 ssh-2.0-openssh_6.6 subject=/c=us/st=florida/l=orlando/o=creative manager – az office/cn=gnatbox.creative-manager.com/emailaddress=support@iccsllc.com 71.39.252.162 74.45.0.60 ssh-2.0-openssh_4.1 subject=/c=us/st=california/l=sunnyvale/o=tropos networks/ou=manufacturing/cn=tropos router/emailaddress=support@tropos.com 74.45.228.159 ssh-2.0-openssh_5.2 subject=/c=us/st=california/l=sunnyvale/o=tropos networks/ou=manufacturing/cn=tropos router/emailaddress=support@tropos.com 74.45.228.160 ssh-2.0-openssh_5.2 subject=/c=us/st=california/l=sunnyvale/o=tropos networks/ou=manufacturing/cn=tropos router/emailaddress=support@tropos.com 74.45.228.49 ssh-2.0-openssh_5.2 subject=/c=us/st=california/l=sunnyvale/o=tropos networks/ou=manufacturing/cn=tropos router/emailaddress=support@tropos.com 74.45.228.86 ssh-2.0-openssh_5.2 subject=/c=us/st=california/l=sunnyvale/o=tropos networks/ou=manufacturing/cn=tropos router/emailaddress=support@tropos.com 74.45.228.97 ssh-2.0-openssh_5.2 subject=/c=us/st=california/l=sunnyvale/o=tropos networks/ou=manufacturing/cn=tropos router/emailaddress=support@tropos.com 74.45.229.217 ssh-2.0-openssh_5.2 subject=/c=us/st=california/l=sunnyvale/o=tropos networks/ou=manufacturing/cn=tropos router/emailaddress=support@tropos.com 74.45.231.125 ssh-2.0-openssh_5.2 subject=/c=us/st=california/l=sunnyvale/o=tropos networks/ou=manufacturing/cn=tropos router/emailaddress=support@tropos.com 74.45.231.136 ssh-2.0-openssh_5.2 subject=/c=us/st=california/l=sunnyvale/o=tropos networks/ou=manufacturing/cn=tropos router/emailaddress=support@tropos.com 74.45.231.156 ssh-2.0-openssh_5.2 subject=/c=us/st=california/l=sunnyvale/o=tropos networks/ou=manufacturing/cn=tropos router/emailaddress=support@tropos.com 78.188.162.184 ssh-2.0-rosssh 85.14.248.152 ssh-2.0-openssh_6.0p1 debian-4+deb7u3 85.218.41.103 ssh-2.0-openssh_5.9 subject=/c=us/st=california/l=sunnyvale/o=aerohive/ou=default/cn=hiveap 91.229.251.116 ssh-2.0-rosssh 94.141.150.121 ssh-2.0-rosssh 96.24.7.172 ssh-2.0-openssh_5.2 posted in: bitcoin, cold air, computation, cryptography, friends, mathematics, nonloper, philosophy, softwaresucks by stanislav no comments on the matter of brian krebs. published on: friday september 23 2016 the www of brian krebs, perhaps the second-most-worshiped1 patron saint to all english-speaking “computer security” charlatans — is sitting sadly offline today on account of a ~tb/sec ddos flood.2 his titanic bandwidth, it turns out, was provided gratis by akamai – spamatronicists par excellence and industrial-scale enablers of everything that makes the modern-day www a rancid sewer. until it wasn’t. as soon krebs began to cost them serious coin, he was dropped like a discarded candy wrapper. and i’m expected, apparently, to see the misadventures of krebs as a lamentable thing. but i do not — and am quite ready to explain why not to the patient and curious reader. krebs is renowned for his investigations of “cybercrime”, which in his eyes consists of russian (for some… reason – almost exclusively russian) spammers, malware artists, and “carders”. now, spam as we know it exists largely for two purposes: to mooch, by various means, from the great gas giants of advertising-crapolade, e.g., google; and to spread malware. the latter exists mainly to facilitate “carding.” 3 and if we listen to krebs and his ilk, we might believe that these problems are problems because there is a faraway country, full of evil untermenschen, who like nothing more than to steal the last penny from every honest american joe, and to pollute his precious bodily fluids. and who decided that the best way to do this is to write virii and send spam. and krebs would also have us believe that the pill against such headaches is to make a pompous www site, with many flow charts, containing some names of especially-uppity untermenschen who are then to be kidnapped by nato gauleiters and shipped, bound and gagged, to american prisons.. now apparently, if we listen to krebs et al., writing virii is a “cybercrime” — but forcefeeding microsoft’s sorry excuse for an operating system to the ~entire planet, for decades, somehow is not. and stealing credit card numbers is a “cybercrime” — but forcing people to use a financial system where someone can drain your account by learning a constant string, printed in plain text4 on a piece of plastic in your pocket, somehow is not. and guess what else – distributing amateur-hour “spyware” is a “cybercrime” — but artfully sabotaging open source software somehow is not. when you’re the nsa. because it is not about “crime”. it is about the hegemony of a particular set of crowned criminals whom krebs shills for. when i wrote to krebs regarding the mahmood khadeer bombshell – the most recent and spectacular of a series of discoveries proving the existence, in the wild, of sabotaged pgp clients – there was no response. which, in retrospect, ought to have been no sort of surprise. because the mass5 sabotage of rsa implementations was not a crime authored by any criminal krebs is interested in prosecuting, but by his beloved masters. who hung him out to dry today. “the world’s smallest violin plays.” edit: the next day, krebs was taken under the wing of google’s “project shield”: project shield welcomes applications from websites serving news, human rights, or elections monitoring content. we do not provide service to other types of content, including gaming, businesses, or individual blogs. see our user content and conduct policy for more details. say hello to the internet of the future! where usg shills are hosted on an “infrastructural”, one-way tv-style “internet”, and everybody else gets to inhabit the remains of the old, ddosable kind. after schneier, of course. ↩ the ddos-enabling design of the internet as we know it is no accident. ↩ “carding” is a crime which happens at the pleasure of certain banks, who profit handsomely from it. this is not an especially well-kept secret. ↩ public-key cryptography has been around for quite a while. ↩ we’ve found, one can surmise, only the tip of the birthday theorem iceberg thus far. ↩ posted in: chumpatronics, cryptography, distractions, hot air, philosophy, softwaresucks by stanislav 5 comments a complete pill for the sage smartprobe. published on: monday september 19 2016 note: please read the faq!!! the sage smartprobe was a very spiffy “hard ice” debugger, one of the few ever manufactured for use with modern (2010s) amd x86-64 processors, and – as far as i’m aware – the only one ever sold on the mass market, rather than as part of “favourite son” deals (as, e.g., intel’s, and arium’s similar products were, and perhaps still are.) probe (right hand side) and "gizmoboard" amd g-series motherboard (left hand side.) quite a few of these things ended up bundled with various dev boards, saddled with time-limited demo expiration (yes, a time-limited hardware peripheral! don’t ask me…) the vendor perma-re-enabled an expired probe for a small fee. sage eng. llc, it appears, is long dead. leaving no trace! how and why it died is unknown to me. so now, instead of being unique tools in the development of, e.g., coreboot, or whatever other attempts at sane utilization of x86-64 iron, the demo probes are stuck in limbo, working as so many peculiar paperweights. this is a crying shame. now you cannot unbrick the expired probes for any price. (at least not by buying the magic code from the original maker…) so, without further delay, let us get one of these patients onto the operating table: jtag test points. (click for full size.) now you could connect the thing to your favourite openocd-compatible jtag probe, and play around with the internals. e.g., this gdb script will give you an instruction trace. there are many interesting things to be learned, re: the command set (most of which is gdb-compatible, but there are a few interesting sharp edges.) or you could skip straight to the pill: sage_pill.py (sha256: 2f9ce44fe069705a7ee83c0f4c733a6a0cc374613429c5c1f47a8481aa464b60) sage_last_public_fw.tar.gz (sha256: 30c005febfbff531a2b9d06ef8c2c41fedb2c8993a2992a373fbeb66900fbaf8) 1) download the pill and the fw image. 2) check the sha256 sums. 3) unpack the firmware image. 4) plug in the probe. 5) ./sage_pill.py sage_last_public_fw.bin /dev/ttyacm0 you may have ended up with some device other than ttyacm0 when you plugged it in. find out which. the script will need to run with sufficient privileges to talk to the “modem”. it will ask for a final confirmation prior to firing. 6) enjoy a 100% working x86-64 “hard ice”. this article is continued here. posted in: cold air, computation, hardware, nonloper, photo, softwarearchaeology by stanislav no comments tears of the phucked. published on: friday july 22 2016 grumman hellcat. phuctor – rewritten and revved up on new hardware in april – is presently eating ssh rsa keys from a scan of the complete ipv4 space. and, on occasion, breaking some. and generating other laughs as well.  in today’s server logs: 134.223.116.158 - - [22/jul/2016:15:54:57 +0000] "get /gpgkey/50840391e5677882196999c9ae77f3177e6cbf8d35fb4f1fef848cfadf9088b1 http/1.1" 200 3425 "http://134.223.116.149:15871/cgi-bin/blockpage.cgi?ws-session=2010817170 " what’s that? a ‘websense’ censortron control panel, apparently. who might it belong to ? could it be: isn’t it just a little bit too late for this nonsense? plus, your monkemployees can still read the page when they clock out and go home. or on their phones, in the toilets, etc.  why bother with this nonsense ? phuctor isn’t even a ‘wikileak’ or the like, it is merely one of the public whipping posts to which you have been tied, by your own hands, long ago. posted in: cold air, computation, cryptography, friends, mathematics, nonloper, softwaresucks by stanislav no comments terraforming the “mycloud mini” : tty. published on: thursday june 02 2016 “mycloud mini” is a ~$50, dual-core arm, 256m ram, 256m flash, dual sata box, in various respects similar to the famous pogoplug. use a standard (e.g., cp1202) ttl converter. and you will get: stage-1 bootloader 1 28 10:36:29 cst 2011 attempting to set plla to 750mhz ... plla_ctrl0 : 0x0000000a plla_ctrl1 : 0x000f0000 plla_ctrl2 : 0x001d01a0 plla_ctrl3 : 0x00000017 plla set setup memory, testing, image 0 hdr len: 0x0001ac3c hdr crc: 0xb931ad17 ok u-boot 1.1.2 (oct 28 2011 - 10:44:29) u-boot code: 60d00000 -> 60d1ac3c bss: -> 60d1f2f4 ram configuration: bank #0: 60000000 256 mb sram configuration: 64kb at 0x50000000 nand:256 mib *** warning - bad crc, using default environment in: serial out: serial err: serial setting linux mem= boot arg value reading upgrade flag from nand address 0x01ec0000 : 0 hit any key to stop autoboot: 0 $ posted in: bitcoin, cold air, hardware, nonloper by stanislav 2 comments « previous search for: support this site: bitcoin, by popular demand: 1nrrhyzmum2jahjeszuffitqg9w8undfzm categories bitcoin (19) books (6) chumpatronics (5) cold air (28) computation (27) copyright (3) cryptography (20) distractions (39) friends (9) hardware (30) hot air (56) idea (13) lisp (26) lispmachine (10) loperos (20) mathematics (23) memory (6) mit (2) modestproposal (14) nonloper (91) papers (5) philosophy (48) photo (13) physics (3) predictions (5) progress (7) reactions (3) shouldersgiants (24) softwarearchaeology (27) softwaresucks (46) symbolics (8) uncategorized (2) about intro: part i intro: part ii collaborations no such labs phuctor therealbitcoin tmsr people abstract heresies angry unix programmer arcane sentiment axis of eval blogdial chris harrison dmitry orlov don lancaster doron zeilberger erik naggum freedom to tinker frozenlock greg egan ignorantguru ilkka kokkarinen imagine27 irreal john walker lambda the ultimate lemonodor lichtblau lispian micro_research mircea popescu moron lab neil dickson pascal costanza peter woit philip greenspun richard gabriel richard kulisz roly perera scott locklin shtetl-optimized steve dutch structural insight ted nelson terence tao terry davis theodore gray uncle al unenumerated unqualified reservations xah lee popular posts bitcoin, or how to hammer in nails with a microscope. don’t blame the mice engelbart’s violin going nowhere really fast, or how computers only come in two speeds. no formats, no format wars. non-apple’s mistake steam lisp stierlitz, the fearless, driver-less bus analyzer. the wisdom of erik naggum thumbs down for clojure where lisp fails: at turning people into fungible cogs. why hypercard had to die sub-projects ezotgdbg stierlitz toys badatentropy microwriter emulator vintage lmkbd paralleleye parasid archives may 2017 january 2017 october 2016 september 2016 july 2016 june 2016 april 2016 march 2016 december 2015 october 2015 august 2015 may 2015 june 2014 april 2014 march 2014 january 2014 december 2013 november 2013 october 2013 september 2013 july 2013 may 2013 april 2013 february 2013 january 2013 october 2012 september 2012 august 2012 june 2012 may 2012 april 2012 march 2012 february 2012 january 2012 december 2011 november 2011 october 2011 july 2011 may 2011 april 2011 march 2011 january 2011 november 2010 september 2010 august 2010 july 2010 june 2010 april 2010 march 2010 february 2010 january 2010 december 2009 october 2009 september 2009 august 2009 july 2009 june 2009 may 2009 march 2009 february 2009 january 2009 december 2008 september 2008 august 2008 july 2008 june 2008 may 2008 february 2008 january 2008 december 2007 november 2007 meta log in copyright © 2016 stanislav datskovskiy · any views or opinions presented on this site are solely those of the author, stanislav datskovskiy, and do not necessarily represent those of his clients, employers, or associates. all information on this site is provided as-is, with no warranties whatsoever.


Here you find all texts from your page as Google (googlebot) and others search engines seen it.

Words density analysis:

Numbers of all words: 5775

One word

Two words phrases

Three words phrases

the - 5.68% (328)
and - 2.2% (127)
you - 1.52% (88)
for - 1.26% (73)
ssh - 1.23% (71)
key - 1.09% (63)
are - 1.07% (62)
our - 0.9% (52)
his - 0.78% (45)
with - 0.78% (45)
ted - 0.73% (42)
per - 0.73% (42)
not - 0.66% (38)
your - 0.64% (37)
here - 0.64% (37)
bit - 0.62% (36)
use - 0.62% (36)
this - 0.62% (36)
probe - 0.61% (35)
all - 0.59% (34)
gdb - 0.57% (33)
one - 0.57% (33)
par - 0.57% (33)
sage - 0.55% (32)
now - 0.55% (32)
act - 0.52% (30)
but - 0.52% (30)
out - 0.5% (29)
that - 0.5% (29)
other - 0.5% (29)
its - 0.47% (27)
will - 0.47% (27)
old - 0.45% (26)
men - 0.45% (26)
can - 0.43% (25)
able - 0.42% (24)
some - 0.42% (24)
from - 0.4% (23)
public - 0.4% (23)
have - 0.4% (23)
work - 0.4% (23)
256 - 0.38% (22)
sub - 0.38% (22)
ever - 0.38% (22)
lamport - 0.38% (22)
200 - 0.38% (22)
time - 0.38% (22)
sign - 0.36% (21)
has - 0.36% (21)
- 0.36% (21)
open - 0.35% (20)
code - 0.35% (20)
subject - 0.33% (19)
echo - 0.33% (19)
day - 0.33% (19)
crypto - 0.33% (19)
bits - 0.31% (18)
key. - 0.31% (18)
set - 0.31% (18)
add - 0.31% (18)
hash - 0.31% (18)
may - 0.29% (17)
- 0.29% (17)
end - 0.29% (17)
air - 0.29% (17)
software - 0.28% (16)
two - 0.28% (16)
what - 0.28% (16)
- 0.28% (16)
fact - 0.28% (16)
put - 0.28% (16)
smartprobe - 0.28% (16)
own - 0.28% (16)
2016 - 0.28% (16)
read - 0.26% (15)
get - 0.26% (15)
which - 0.26% (15)
where - 0.26% (15)
how - 0.26% (15)
log - 0.24% (14)
who - 0.24% (14)
sha256 - 0.24% (14)
let - 0.24% (14)
was - 0.24% (14)
payload - 0.24% (14)
thing - 0.23% (13)
address - 0.23% (13)
on: - 0.23% (13)
part - 0.23% (13)
support - 0.23% (13)
loper - 0.23% (13)
krebs - 0.21% (12)
like - 0.21% (12)
stanislav - 0.21% (12)
long - 0.21% (12)
dev - 0.21% (12)
(gdb) - 0.21% (12)
boot - 0.21% (12)
make - 0.21% (12)
any - 0.21% (12)
then - 0.21% (12)
published - 0.21% (12)
pill - 0.21% (12)
in: - 0.19% (11)
2011 - 0.19% (11)
there - 0.19% (11)
air, - 0.19% (11)
cut - 0.19% (11)
ssh-2.0-openssh_5.2 - 0.19% (11)
them - 0.19% (11)
works - 0.19% (11)
arg - 0.19% (11)
2010 - 0.19% (11)
string - 0.19% (11)
board - 0.19% (11)
comment - 0.17% (10)
router/emailaddress=support@tropos.com - 0.17% (10)
don - 0.17% (10)
subject=/c=us/st=california/l=sunnyvale/o=tropos - 0.17% (10)
2009 - 0.17% (10)
posted - 0.17% (10)
hot - 0.17% (10)
nonloper - 0.17% (10)
networks/ou=manufacturing/cn=tropos - 0.17% (10)
private - 0.17% (10)
know - 0.17% (10)
september - 0.17% (10)
parachute - 0.17% (10)
ida - 0.16% (9)
point - 0.16% (9)
signature - 0.16% (9)
come - 0.16% (9)
exist - 0.16% (9)
take - 0.16% (9)
sha256sum - 0.16% (9)
computation - 0.16% (9)
comments - 0.16% (9)
cold - 0.16% (9)
2012 - 0.16% (9)
january - 0.16% (9)
ret - 0.16% (9)
quit - 0.16% (9)
very - 0.16% (9)
2013 - 0.16% (9)
it. - 0.16% (9)
sold - 0.16% (9)
ssh-1.99-huawei-1.5 - 0.14% (8)
back - 0.14% (8)
bitcoin - 0.14% (8)
these - 0.14% (8)
-f1 - 0.14% (8)
ssh-1.99-dopra-1.5 - 0.14% (8)
2008 - 0.14% (8)
### - 0.14% (8)
certain - 0.14% (8)
bug - 0.14% (8)
cryptography - 0.14% (8)
hardware - 0.14% (8)
october - 0.14% (8)
ram - 0.14% (8)
quite - 0.14% (8)
see - 0.14% (8)
bus - 0.14% (8)
e.g., - 0.14% (8)
been - 0.14% (8)
hit - 0.14% (8)
way - 0.14% (8)
nonloper, - 0.14% (8)
amd - 0.14% (8)
solder - 0.14% (8)
- 0.12% (7)
sad - 0.12% (7)
connect - 0.12% (7)
would - 0.12% (7)
i.e. - 0.12% (7)
last - 0.12% (7)
free - 0.12% (7)
july - 0.12% (7)
april - 0.12% (7)
type - 0.12% (7)
hand - 0.12% (7)
such - 0.12% (7)
card - 0.12% (7)
debug - 0.12% (7)
die - 0.12% (7)
break - 0.12% (7)
privkey.txt - 0.12% (7)
pubkey.txt - 0.12% (7)
generate - 0.12% (7)
command - 0.12% (7)
phuctor - 0.12% (7)
site - 0.12% (7)
keys - 0.12% (7)
ask - 0.12% (7)
only - 0.12% (7)
softwaresucks - 0.12% (7)
june - 0.12% (7)
does - 0.12% (7)
crime - 0.12% (7)
encoded - 0.12% (7)
late - 0.12% (7)
computation, - 0.12% (7)
right - 0.12% (7)
another - 0.1% (6)
happen - 0.1% (6)
they - 0.1% (6)
intel - 0.1% (6)
help - 0.1% (6)
plla - 0.1% (6)
when - 0.1% (6)
coin, - 0.1% (6)
march - 0.1% (6)
random - 0.1% (6)
article - 0.1% (6)
exit - 0.1% (6)
call - 0.1% (6)
december - 0.1% (6)
vendor - 0.1% (6)
new - 0.1% (6)
pop - 0.1% (6)
cryptographic - 0.1% (6)
strength - 0.1% (6)
than - 0.1% (6)
try - 0.1% (6)
simply - 0.1% (6)
business - 0.1% (6)
user - 0.1% (6)
rely - 0.1% (6)
me. - 0.1% (6)
known - 0.1% (6)
x86 - 0.1% (6)
kind - 0.1% (6)
done - 0.1% (6)
encoded.txt - 0.1% (6)
lead - 0.1% (6)
become - 0.1% (6)
mit - 0.1% (6)
were - 0.1% (6)
lab - 0.1% (6)
made - 0.09% (5)
rsa - 0.09% (5)
motherboard - 0.09% (5)
version - 0.09% (5)
main - 0.09% (5)
system - 0.09% (5)
cryptography, - 0.09% (5)
february - 0.09% (5)
might - 0.09% (5)
august - 0.09% (5)
had - 0.09% (5)
case - 0.09% (5)
whatever - 0.09% (5)
met - 0.09% (5)
bitcoin, - 0.09% (5)
bash - 0.09% (5)
2014 - 0.09% (5)
apparent - 0.09% (5)
is: - 0.09% (5)
plug - 0.09% (5)
about - 0.09% (5)
say - 0.09% (5)
probe. - 0.09% (5)
box - 0.09% (5)
after - 0.09% (5)
similar - 0.09% (5)
well - 0.09% (5)
column - 0.09% (5)
possible - 0.09% (5)
why - 0.09% (5)
hardware, - 0.09% (5)
let’s - 0.09% (5)
lisp - 0.09% (5)
row - 0.09% (5)
iron - 0.09% (5)
usage - 0.09% (5)
complete - 0.09% (5)
today - 0.09% (5)
particular - 0.09% (5)
did - 0.09% (5)
should - 0.09% (5)
philosophy - 0.09% (5)
times - 0.09% (5)
just - 0.09% (5)
happens - 0.09% (5)
softwarearchaeology - 0.09% (5)
$(echo - 0.09% (5)
ban - 0.09% (5)
hello - 0.07% (4)
here. - 0.07% (4)
instead - 0.07% (4)
0x001035b5 - 0.07% (4)
parachute” - 0.07% (4)
roly - 0.07% (4)
-f1) - 0.07% (4)
near - 0.07% (4)
each - 0.07% (4)
steal - 0.07% (4)
plain - 0.07% (4)
giants - 0.07% (4)
linux - 0.07% (4)
every - 0.07% (4)
people - 0.07% (4)
smartprobe. - 0.07% (4)
november - 0.07% (4)
load. - 0.07% (4)
lamport_decode.sh - 0.07% (4)
spam - 0.07% (4)
x86-64 - 0.07% (4)
full - 0.07% (4)
program - 0.07% (4)
computer - 0.07% (4)
slow - 0.07% (4)
compromise - 0.07% (4)
off - 0.07% (4)
because - 0.07% (4)
“cybercrime” - 0.07% (4)
wing - 0.07% (4)
be, - 0.07% (4)
things - 0.07% (4)
mathematics - 0.07% (4)
advance - 0.07% (4)
implementation - 0.07% (4)
generated - 0.07% (4)
reader - 0.07% (4)
under - 0.07% (4)
space - 0.07% (4)
problem - 0.07% (4)
choice - 0.07% (4)
working - 0.07% (4)
far - 0.07% (4)
good - 0.07% (4)
many - 0.07% (4)
feed - 0.07% (4)
most - 0.07% (4)
signing - 0.07% (4)
mass - 0.07% (4)
must - 0.07% (4)
fall - 0.07% (4)
could - 0.07% (4)
friends - 0.07% (4)
view - 0.07% (4)
now, - 0.07% (4)
so, - 0.07% (4)
$0` - 0.07% (4)
patron - 0.07% (4)
no. - 0.07% (4)
show - 0.07% (4)
"attack - 0.07% (4)
found - 0.07% (4)
2015 - 0.07% (4)
-lt - 0.07% (4)
few - 0.07% (4)
strings - 0.07% (4)
too - 0.07% (4)
./`basename - 0.07% (4)
remote - 0.07% (4)
lamport_mkpriv.sh - 0.07% (4)
#!/bin/bash - 0.07% (4)
dawn." - 0.07% (4)
ttyacm0 - 0.07% (4)
still - 0.07% (4)
"usage: - 0.07% (4)
or, - 0.07% (4)
target - 0.07% (4)
serial - 0.07% (4)
cpu - 0.07% (4)
being - 0.07% (4)
configuration - 0.07% (4)
2017 - 0.07% (4)
coreboot - 0.07% (4)
ttl - 0.07% (4)
life - 0.07% (4)
capacitor - 0.07% (4)
search - 0.07% (4)
philosophy, - 0.07% (4)
expect - 0.07% (4)
while - 0.07% (4)
in. - 0.07% (4)
run - 0.07% (4)
account - 0.07% (4)
key, - 0.07% (4)
instruction - 0.07% (4)
... - 0.07% (4)
please - 0.07% (4)
dual - 0.07% (4)
before - 0.07% (4)
scenario - 0.05% (3)
512 - 0.05% (3)
100 - 0.05% (3)
learn - 0.05% (3)
bitstring - 0.05% (3)
death - 0.05% (3)
1d6c270d7cc7e82a816ffb7bc3797d213b24d9d17af48f4b3b8d01fb43ed15c3 - 0.05% (3)
phuctored - 0.05% (3)
somehow - 0.05% (3)
not. - 0.05% (3)
“parachute” - 0.05% (3)
ssh-2.0-rosssh - 0.05% (3)
mathematics, - 0.05% (3)
choosing - 0.05% (3)
ssh-1.99-comware-5.20 - 0.05% (3)
over - 0.05% (3)
source - 0.05% (3)
algorithm - 0.05% (3)
ssh-2.0-audiocodes - 0.05% (3)
exists - 0.05% (3)
lamport_priv2pub.sh - 0.05% (3)
friends, - 0.05% (3)
various - 0.05% (3)
example - 0.05% (3)
consider - 0.05% (3)
never - 0.05% (3)
ready - 0.05% (3)
reason - 0.05% (3)
kind. - 0.05% (3)
more - 0.05% (3)
box. - 0.05% (3)
hashutil - 0.05% (3)
give - 0.05% (3)
writing - 0.05% (3)
./lamport_decode.sh - 0.05% (3)
used - 0.05% (3)
www - 0.05% (3)
field - 0.05% (3)
original - 0.05% (3)
this: - 0.05% (3)
interesting - 0.05% (3)
second - 0.05% (3)
away - 0.05% (3)
payload. - 0.05% (3)
merely - 0.05% (3)
length - 0.05% (3)
third - 0.05% (3)
result - 0.05% (3)
ddos - 0.05% (3)
light - 0.05% (3)
\n" - 0.05% (3)
friday - 0.05% (3)
schemes - 0.05% (3)
sage_pill.py - 0.05% (3)
i386 - 0.05% (3)
architecture - 0.05% (3)
device - 0.05% (3)
one, - 0.05% (3)
though - 0.05% (3)
debugging - 0.05% (3)
sure - 0.05% (3)
photo - 0.05% (3)
don’t - 0.05% (3)
instructions - 0.05% (3)
fritz - 0.05% (3)
shouldersgiants - 0.05% (3)
remember - 0.05% (3)
gnu - 0.05% (3)
egan - 0.05% (3)
7.8 - 0.05% (3)
into - 0.05% (3)
0x1035a4 - 0.05% (3)
connected - 0.05% (3)
work. - 0.05% (3)
details. - 0.05% (3)
copyright - 0.05% (3)
problems - 0.05% (3)
later - 0.05% (3)
"show - 0.05% (3)
bios - 0.05% (3)
intro - 0.05% (3)
(5) - 0.05% (3)
otherwise - 0.05% (3)
patient - 0.05% (3)
capacitors - 0.05% (3)
somewhat - 0.05% (3)
find - 0.05% (3)
years - 0.05% (3)
switch - 0.05% (3)
same - 0.05% (3)
electrolytic - 0.05% (3)
(3) - 0.05% (3)
answer - 0.05% (3)
even - 0.05% (3)
manufacture - 0.05% (3)
perhaps - 0.05% (3)
image - 0.05% (3)
owner - 0.05% (3)
nsa - 0.05% (3)
chip - 0.05% (3)
default - 0.05% (3)
chumpatronics - 0.05% (3)
turns - 0.05% (3)
melt - 0.05% (3)
vintage - 0.05% (3)
probe, - 0.05% (3)
test - 0.05% (3)
shield - 0.05% (3)
provide - 0.05% (3)
project - 0.05% (3)
cost - 0.05% (3)
their - 0.05% (3)
popular - 0.05% (3)
product - 0.05% (3)
longer - 0.05% (3)
broken - 0.05% (3)
shitware - 0.05% (3)
internet - 0.05% (3)
content - 0.05% (3)
available - 0.05% (3)
idea - 0.05% (3)
possibly - 0.05% (3)
ought - 0.05% (3)
those - 0.05% (3)
nothing - 0.05% (3)
whatsoever - 0.05% (3)
series - 0.05% (3)
regard - 0.05% (3)
his, - 0.05% (3)
care - 0.05% (3)
feeding - 0.05% (3)
faq - 0.05% (3)
around - 0.05% (3)
previous - 0.05% (3)
next - 0.05% (3)
buy - 0.05% (3)
session - 0.05% (3)
format - 0.05% (3)
also - 0.05% (3)
need - 0.05% (3)
note - 0.05% (3)
ended - 0.05% (3)
jtag - 0.05% (3)
verify - 0.05% (3)
it, - 0.05% (3)
without - 0.05% (3)
common - 0.05% (3)
/dev/ttyacm0 - 0.05% (3)
great - 0.05% (3)
machine - 0.03% (2)
space. - 0.03% (2)
(20) - 0.03% (2)
ipv4 - 0.03% (2)
distractions - 0.03% (2)
structural - 0.03% (2)
grave - 0.03% (2)
datskovskiy - 0.03% (2)
2007 - 0.03% (2)
scan - 0.03% (2)
popescu - 0.03% (2)
stuck - 0.03% (2)
(2) - 0.03% (2)
stierlitz - 0.03% (2)
naggum - 0.03% (2)
uncategorized - 0.03% (2)
papers - 0.03% (2)
richard - 0.03% (2)
erik - 0.03% (2)
down - 0.03% (2)
greg - 0.03% (2)
nowhere - 0.03% (2)
(13) - 0.03% (2)
intro: - 0.03% (2)
ssl - 0.03% (2)
memory - 0.03% (2)
questions - 0.03% (2)
click - 0.03% (2)
256m - 0.03% (2)
evil - 0.03% (2)
believe - 0.03% (2)
listen - 0.03% (2)
ice” - 0.03% (2)
“hard - 0.03% (2)
especially - 0.03% (2)
tip - 0.03% (2)
modern - 0.03% (2)
time-limited - 0.03% (2)
russian - 0.03% (2)
unknown - 0.03% (2)
probes - 0.03% (2)
small - 0.03% (2)
malware - 0.03% (2)
demo - 0.03% (2)
expired - 0.03% (2)
american - 0.03% (2)
service - 0.03% (2)
sort - 0.03% (2)
sabotage - 0.03% (2)
criminal - 0.03% (2)
else - 0.03% (2)
clients - 0.03% (2)
recent - 0.03% (2)
shills - 0.03% (2)
hung - 0.03% (2)
violin - 0.03% (2)
virii - 0.03% (2)
write - 0.03% (2)
untermenschen - 0.03% (2)
nato - 0.03% (2)
operating - 0.03% (2)
day, - 0.03% (2)
eyes - 0.03% (2)
favourite - 0.03% (2)
u-boot - 0.03% (2)
configuration: - 0.03% (2)
bank - 0.03% (2)
hdr - 0.03% (2)
mini” - 0.03% (2)
posts - 0.03% (2)
“mycloud - 0.03% (2)
warning - 0.03% (2)
bad - 0.03% (2)
ssh-2.0-openssh_5.9 - 0.03% (2)
ssh-2.0-openssh_6.0p1 - 0.03% (2)
subject=/c=us/st=california/l=sunnyvale/o=aerohive/ou=default/cn=hiveap - 0.03% (2)
(6) - 0.03% (2)
manager - 0.03% (2)
nand - 0.03% (2)
nonsense - 0.03% (2)
page - 0.03% (2)
script - 0.03% (2)
re: - 0.03% (2)
provided - 0.03% (2)
began - 0.03% (2)
i’m - 0.03% (2)
play - 0.03% (2)
apparently, - 0.03% (2)
(sha256: - 0.03% (2)
image. - 0.03% (2)
be: - 0.03% (2)
isn’t - 0.03% (2)
server - 0.03% (2)
final - 0.03% (2)
brian - 0.03% (2)
sufficient - 0.03% (2)
(27) - 0.03% (2)
’tis - 0.03% (2)
thing, - 0.03% (2)
merit - 0.03% (2)
faq!!! - 0.03% (2)
note: - 0.03% (2)
chumpatronics, - 0.03% (2)
discussion - 0.03% (2)
whatsoever. - 0.03% (2)
configure - 0.03% (2)
logging - 0.03% (2)
interface. - 0.03% (2)
gdb-compatible - 0.03% (2)
spiffy - 0.03% (2)
monday - 0.03% (2)
physics - 0.03% (2)
solder, - 0.03% (2)
wick - 0.03% (2)
leaded - 0.03% (2)
against - 0.03% (2)
iron, - 0.03% (2)
slowly - 0.03% (2)
alloy - 0.03% (2)
caps - 0.03% (2)
photo, - 0.03% (2)
either - 0.03% (2)
this, - 0.03% (2)
until - 0.03% (2)
file - 0.03% (2)
want - 0.03% (2)
0x001035ab - 0.03% (2)
0x001035ad - 0.03% (2)
0x001035a9 - 0.03% (2)
0x001015ae - 0.03% (2)
commands - 0.03% (2)
cmp - 0.03% (2)
0x001035af - 0.03% (2)
0x001035b7 - 0.03% (2)
0x001035ba - 0.03% (2)
0x001035b5: - 0.03% (2)
0x001035b3 - 0.03% (2)
0x001035b1 - 0.03% (2)
word" - 0.03% (2)
manual - 0.03% (2)
let's - 0.03% (2)
gas - 0.03% (2)
you're - 0.03% (2)
#set - 0.03% (2)
raw - 0.03% (2)
gui - 0.03% (2)
instance, - 0.03% (2)
gpl - 0.03% (2)
license - 0.03% (2)
7.8.1 - 0.03% (2)
g-series - 0.03% (2)
soldering - 0.03% (2)
commonplace - 0.03% (2)
firmware - 0.03% (2)
released - 0.03% (2)
(the - 0.03% (2)
return - 0.03% (2)
(or - 0.03% (2)
use. - 0.03% (2)
edk - 0.03% (2)
plugged - 0.03% (2)
strange - 0.03% (2)
continue - 0.03% (2)
got - 0.03% (2)
java - 0.03% (2)
cured - 0.03% (2)
itself - 0.03% (2)
smartprobe? - 0.03% (2)
include - 0.03% (2)
what’s - 0.03% (2)
pgp - 0.03% (2)
home - 0.03% (2)
“gizmo - 0.03% (2)
devices - 0.03% (2)
through - 0.03% (2)
correct - 0.03% (2)
gets - 0.03% (2)
require - 0.03% (2)
products - 0.03% (2)
earlier - 0.03% (2)
modes - 0.03% (2)
cheap - 0.03% (2)
and, - 0.03% (2)
already - 0.03% (2)
nearly - 0.03% (2)
out, - 0.03% (2)
job - 0.03% (2)
large - 0.03% (2)
melting - 0.03% (2)
higher - 0.03% (2)
begin - 0.03% (2)
temperature - 0.03% (2)
setting - 0.03% (2)
precious - 0.03% (2)
case, - 0.03% (2)
amd’s - 0.03% (2)
motherboard? - 0.03% (2)
however, - 0.03% (2)
(it - 0.03% (2)
pcengines - 0.03% (2)
intel’s - 0.03% (2)
debugger - 0.03% (2)
microsoft’s - 0.03% (2)
slightly - 0.03% (2)
opteron - 0.03% (2)
mainly - 0.03% (2)
%ebx - 0.03% (2)
received - 0.03% (2)
value - 0.03% (2)
key: - 0.03% (2)
suicidal - 0.03% (2)
256-bit - 0.03% (2)
./lamport_mkpriv.sh - 0.03% (2)
xxd - 0.03% (2)
./lamport_priv2pub.sh - 0.03% (2)
lamport_encode.sh - 0.03% (2)
hexpayload - 0.03% (2)
another_pubkey.txt - 0.03% (2)
another_privkey.txt - 0.03% (2)
generating - 0.03% (2)
xargs - 0.03% (2)
/dev/random - 0.03% (2)
bitstrings - 0.03% (2)
hashed - 0.03% (2)
consists - 0.03% (2)
practice. - 0.03% (2)
didactic - 0.03% (2)
equal - 0.03% (2)
resulting - 0.03% (2)
shall - 0.03% (2)
payloadbits - 0.03% (2)
pre-hash - 0.03% (2)
reveals - 0.03% (2)
hash, - 0.03% (2)
'[:lower:]' - 0.03% (2)
necessarily - 0.03% (2)
observe - 0.03% (2)
like, - 0.03% (2)
<(echo - 0.03% (2)
encoded.txt) - 0.03% (2)
(./lamport_decode.sh - 0.03% (2)
masters - 0.03% (2)
timestamp - 0.03% (2)
hand. - 0.03% (2)
battlefield - 0.03% (2)
yourself - 0.03% (2)
further - 0.03% (2)
sane - 0.03% (2)
diff - 0.03% (2)
hashing - 0.03% (2)
whom - 0.03% (2)
taken - 0.03% (2)
destroy - 0.03% (2)
signature. - 0.03% (2)
e.g.: - 0.03% (2)
$pkl - 0.03% (2)
false - 0.03% (2)
message - 0.03% (2)
'[:upper:]' - 0.03% (2)
'\\\n' - 0.03% (2)
printf - 0.03% (2)
top - 0.03% (2)
presently - 0.03% (2)
questionable - 0.03% (2)
attempts - 0.03% (2)
revocation - 0.03% (2)
becomes - 0.03% (2)
mathematical - 0.03% (2)
onto - 0.03% (2)
someone - 0.03% (2)
article. - 0.03% (2)
rescue - 0.03% (2)
accept - 0.03% (2)
steals - 0.03% (2)
walk - 0.03% (2)
cryptosystem - 0.03% (2)
keys, - 0.03% (2)
site, - 0.03% (2)
trace. - 0.03% (2)
pci - 0.03% (2)
other, - 0.03% (2)
signal - 0.03% (2)
shouldersgiants, - 0.03% (2)
softwarearchaeology, - 0.03% (2)
means - 0.03% (2)
within - 0.03% (2)
via - 0.03% (2)
identity - 0.03% (2)
thought - 0.03% (2)
compromised - 0.03% (2)
wot - 0.03% (2)
reader, - 0.03% (2)
scenario. - 0.03% (2)
soon - 0.03% (2)
collision-resistant - 0.03% (2)
number-theoretic - 0.03% (2)
presented - 0.03% (2)
written - 0.03% (2)
individual - 0.03% (2)
function - 0.03% (2)
expected - 0.03% (2)
strictly - 0.03% (2)
makes - 0.03% (2)
died - 0.03% (2)
fallback - 0.03% (2)
associates - 0.03% (2)
conceivably - 0.03% (2)
current - 0.03% (2)
time. - 0.03% (2)
existence - 0.03% (2)
safely - 0.03% (2)
breaking - 0.03% (2)
enemy - 0.03% (2)
keypair - 0.03% (2)
caveat - 0.03% (2)
obvious - 0.03% (2)
along - 0.03% (2)
of the - 0.52% (30)
at the - 0.28% (16)
public key - 0.28% (16)
to the - 0.26% (15)
sage smartprobe - 0.23% (13)
if you - 0.21% (12)
in the - 0.21% (12)
the probe - 0.21% (12)
on the - 0.19% (11)
published on - 0.19% (11)
by stanislav - 0.17% (10)
subject=/c=us/st=california/l=sunnyvale/o=tropos networks/ou=manufacturing/cn=tropos - 0.17% (10)
cut -d - 0.17% (10)
networks/ou=manufacturing/cn=tropos router/emailaddress=support@tropos.com - 0.17% (10)
published on: - 0.17% (10)
posted in: - 0.17% (10)
cold air - 0.16% (9)
private key - 0.16% (9)
that the - 0.16% (9)
ssh-2.0-openssh_5.2 subject=/c=us/st=california/l=sunnyvale/o=tropos - 0.16% (9)
with the - 0.14% (8)
cold air, - 0.14% (8)
is not - 0.12% (7)
the sage - 0.12% (7)
you will - 0.12% (7)
air, computation, - 0.12% (7)
key is - 0.1% (6)
for the - 0.1% (6)
exit 1 - 0.1% (6)
that i - 0.1% (6)
and the - 0.1% (6)
to make - 0.1% (6)
use of - 0.1% (6)
softwaresucks by - 0.09% (5)
in: cold - 0.09% (5)
of this - 0.09% (5)
] then - 0.09% (5)
i have - 0.09% (5)
with a - 0.09% (5)
this is - 0.09% (5)
of your - 0.09% (5)
the pill - 0.09% (5)
if the - 0.09% (5)
you have - 0.09% (5)
then echo - 0.09% (5)
can be - 0.07% (4)
in this - 0.07% (4)
sage smartprobe. - 0.07% (4)
– the - 0.07% (4)
and you - 0.07% (4)
where the - 0.07% (4)
signing key - 0.07% (4)
and other - 0.07% (4)
you are - 0.07% (4)
pubkey.txt < - 0.07% (4)
"usage: ./`basename - 0.07% (4)
$# -lt - 0.07% (4)
sha256sum | - 0.07% (4)
< encoded.txt - 0.07% (4)
' -f1) - 0.07% (4)
no comments - 0.07% (4)
— but - 0.07% (4)
do not - 0.07% (4)
you may - 0.07% (4)
dawn." | - 0.07% (4)
"attack at - 0.07% (4)
able to - 0.07% (4)
./`basename $0` - 0.07% (4)
echo "usage: - 0.07% (4)
#!/bin/bash if - 0.07% (4)
privkey.txt > - 0.07% (4)
the public - 0.07% (4)
| sha256sum - 0.07% (4)
at dawn." - 0.07% (4)
echo "attack - 0.07% (4)
such a - 0.07% (4)
the signature - 0.07% (4)
work with - 0.07% (4)
have been - 0.07% (4)
hardware, nonloper, - 0.07% (4)
the time - 0.07% (4)
possible to - 0.07% (4)
stanislav no - 0.07% (4)
but the - 0.07% (4)
does not - 0.07% (4)
computation, hardware, - 0.07% (4)
like this: - 0.05% (3)
we have - 0.05% (3)
on account - 0.05% (3)
to your - 0.05% (3)
to use - 0.05% (3)
smartprobe work - 0.05% (3)
in advance - 0.05% (3)
now you - 0.05% (3)
echo $p - 0.05% (3)
of business - 0.05% (3)
the private - 0.05% (3)
for use - 0.05% (3)
we simply - 0.05% (3)
that it - 0.05% (3)
so happens - 0.05% (3)
this site - 0.05% (3)
time of - 0.05% (3)
make use - 0.05% (3)
string from - 0.05% (3)
your own - 0.05% (3)
mathematics, nonloper, - 0.05% (3)
happens that - 0.05% (3)
from column - 0.05% (3)
the answer - 0.05% (3)
the board - 0.05% (3)
from the - 0.05% (3)
make a - 0.05% (3)
pill for - 0.05% (3)
account of - 0.05% (3)
computation, cryptography, - 0.05% (3)
a “cybercrime” - 0.05% (3)
a complete - 0.05% (3)
to krebs - 0.05% (3)
is not. - 0.05% (3)
“cybercrime” — - 0.05% (3)
somehow is - 0.05% (3)
in: bitcoin, - 0.05% (3)
have no - 0.05% (3)
of these - 0.05% (3)
answer is - 0.05% (3)
a lamport - 0.05% (3)
probe to - 0.05% (3)
i.e. the - 0.05% (3)
and if - 0.05% (3)
from a - 0.05% (3)
on: friday - 0.05% (3)
cryptography, friends, - 0.05% (3)
bitcoin, cold - 0.05% (3)
one of - 0.05% (3)
now we - 0.05% (3)
a particular - 0.05% (3)
0x1035a4 (gdb) - 0.05% (3)
jb 0x1035a4 - 0.05% (3)
rsa key - 0.05% (3)
### if - 0.05% (3)
philosophy, softwaresucks - 0.05% (3)
will be - 0.05% (3)
from your - 0.05% (3)
– i.e. - 0.05% (3)
take a - 0.05% (3)
a certain - 0.05% (3)
read the - 0.05% (3)
in your - 0.05% (3)
nonloper, philosophy, - 0.03% (2)
care and - 0.03% (2)
sage smartprobe? - 0.03% (2)
feeding of - 0.03% (2)
set architecture - 0.03% (2)
friends, mathematics, - 0.03% (2)
turns out, - 0.03% (2)
believe that - 0.03% (2)
you want - 0.03% (2)
set logging - 0.03% (2)
very spiffy - 0.03% (2)
listen to - 0.03% (2)
to see - 0.03% (2)
perhaps the - 0.03% (2)
target remote - 0.03% (2)
remote 1 - 0.03% (2)
know it - 0.03% (2)
of brian - 0.03% (2)
the complete - 0.03% (2)
at some - 0.03% (2)
<(echo "attack - 0.03% (2)
no longer - 0.03% (2)
long as - 0.03% (2)
at their - 0.03% (2)
< encoded.txt) - 0.03% (2)
< (./lamport_decode.sh - 0.03% (2)
(./lamport_decode.sh sha256sum - 0.03% (2)
encoded.txt) <(echo - 0.03% (2)
public key: - 0.03% (2)
$ diff - 0.03% (2)
cryptographic timestamp - 0.03% (2)
=> 0x001035b5: - 0.03% (2)
so, for - 0.03% (2)
scan of - 0.03% (2)
ipv4 space. - 0.03% (2)
ssh hello - 0.03% (2)
september 23 - 0.03% (2)
amd g-series - 0.03% (2)
0x001035b5 in - 0.03% (2)
if your - 0.03% (2)
pill against - 0.03% (2)
ssh public - 0.03% (2)
is slow - 0.03% (2)
not. and - 0.03% (2)
this article - 0.03% (2)
it will - 0.03% (2)
a sage - 0.03% (2)
a scan - 0.03% (2)
complete ipv4 - 0.03% (2)
will need - 0.03% (2)
when you - 0.03% (2)
you could - 0.03% (2)
pill and - 0.03% (2)
plug in - 0.03% (2)
ended up - 0.03% (2)
with this - 0.03% (2)
in: chumpatronics, - 0.03% (2)
stanislav datskovskiy - 0.03% (2)
no format - 0.03% (2)
on this - 0.03% (2)
those of - 0.03% (2)
stanislav 1 - 0.03% (2)
or how - 0.03% (2)
erik naggum - 0.03% (2)
stanislav 2 - 0.03% (2)
« previous - 0.03% (2)
part i - 0.03% (2)
intro: part - 0.03% (2)
command set - 0.03% (2)
there are - 0.03% (2)
we know - 0.03% (2)
the internet - 0.03% (2)
one can - 0.03% (2)
hot air, - 0.03% (2)
smartprobe. published - 0.03% (2)
because the - 0.03% (2)
was no - 0.03% (2)
java shitware - 0.03% (2)
diff < - 0.03% (2)
it. the - 0.03% (2)
note: please - 0.03% (2)
on: monday - 0.03% (2)
2016 note: - 0.03% (2)
and feeding - 0.03% (2)
the care - 0.03% (2)
the thing - 0.03% (2)
2 comments - 0.03% (2)
similar products - 0.03% (2)
the mass - 0.03% (2)
please read - 0.03% (2)
the faq!!! - 0.03% (2)
a very - 0.03% (2)
melting point - 0.03% (2)
for an - 0.03% (2)
sha256sum pubkey.txt - 0.03% (2)
loper os - 0.03% (2)
lead to - 0.03% (2)
our lamport - 0.03% (2)
softwarearchaeology by - 0.03% (2)
of his - 0.03% (2)
and there - 0.03% (2)
a cheap - 0.03% (2)
is equal - 0.03% (2)
we take - 0.03% (2)
equal to - 0.03% (2)
pre-hash string - 0.03% (2)
here. posted - 0.03% (2)
and motherboard? - 0.03% (2)
it was - 0.03% (2)
intel cpu - 0.03% (2)
sign a - 0.03% (2)
256-bit payload. - 0.03% (2)
256 512 - 0.03% (2)
$ ./lamport_mkpriv.sh - 0.03% (2)
fi for - 0.03% (2)
do echo - 0.03% (2)
done | - 0.03% (2)
xargs -n - 0.03% (2)
the owner - 0.03% (2)
a key, - 0.03% (2)
the reader - 0.03% (2)
i.e. a - 0.03% (2)
implementation of - 0.03% (2)
– is - 0.03% (2)
the enemy - 0.03% (2)
would not - 0.03% (2)
to switch - 0.03% (2)
with your - 0.03% (2)
kind of - 0.03% (2)
which you - 0.03% (2)
may conceivably - 0.03% (2)
to rescue - 0.03% (2)
with some - 0.03% (2)
of key - 0.03% (2)
may be - 0.03% (2)
fritz chip - 0.03% (2)
lamport public - 0.03% (2)
has been - 0.03% (2)
of certain - 0.03% (2)
key signature - 0.03% (2)
merely on - 0.03% (2)
the strength - 0.03% (2)
collision-resistant hash - 0.03% (2)
length of - 0.03% (2)
signing key. - 0.03% (2)
and we - 0.03% (2)
> encoded.txt - 0.03% (2)
you must - 0.03% (2)
other, similar - 0.03% (2)
to verify - 0.03% (2)
have a - 0.03% (2)
the probe, - 0.03% (2)
you plugged - 0.03% (2)
and so - 0.03% (2)
so now - 0.03% (2)
to work - 0.03% (2)
your probe - 0.03% (2)
and your - 0.03% (2)
or whatever - 0.03% (2)
to become - 0.03% (2)
plain old - 0.03% (2)
the sha256 - 0.03% (2)
here we - 0.03% (2)
$pkl | - 0.03% (2)
me with - 0.03% (2)
$0` hashutil - 0.03% (2)
to buy - 0.03% (2)
$(echo $pkl - 0.03% (2)
e.g.: $ - 0.03% (2)
we will - 0.03% (2)
where your - 0.03% (2)
sha256sum < - 0.03% (2)
have to - 0.03% (2)
computer ? - 0.03% (2)
2016 the - 0.03% (2)
$ ./lamport_priv2pub.sh - 0.03% (2)
and it - 0.03% (2)
so long - 0.03% (2)
like to - 0.03% (2)
echo -n - 0.03% (2)
xxd -r - 0.03% (2)
is known - 0.03% (2)
how to - 0.03% (2)
the bits - 0.03% (2)
column a - 0.03% (2)
a 256-bit - 0.03% (2)
this example - 0.03% (2)
the melting - 0.03% (2)
will sage - 0.03% (2)
softwarearchaeology, softwaresucks - 0.03% (2)
otherwise the - 0.03% (2)
the subject - 0.03% (2)
nonloper, photo, - 0.03% (2)
hash of - 0.03% (2)
subject=/c=us/st=california/l=sunnyvale/o=tropos networks/ou=manufacturing/cn=tropos router/emailaddress=support@tropos.com - 0.17% (10)
ssh-2.0-openssh_5.2 subject=/c=us/st=california/l=sunnyvale/o=tropos networks/ou=manufacturing/cn=tropos - 0.16% (9)
cold air, computation, - 0.12% (7)
] then echo - 0.09% (5)
in: cold air, - 0.09% (5)
exit 1 fi - 0.09% (5)
softwaresucks by stanislav - 0.09% (5)
at dawn." | - 0.07% (4)
#!/bin/bash if [ - 0.07% (4)
"usage: ./`basename $0` - 0.07% (4)
echo "usage: ./`basename - 0.07% (4)
dawn." | sha256sum - 0.07% (4)
the sage smartprobe. - 0.07% (4)
by stanislav no - 0.07% (4)
stanislav no comments - 0.07% (4)
at the time - 0.07% (4)
| sha256sum | - 0.07% (4)
"attack at dawn." - 0.07% (4)
sha256sum | cut - 0.07% (4)
computation, hardware, nonloper, - 0.07% (4)
in: bitcoin, cold - 0.05% (3)
philosophy, softwaresucks by - 0.05% (3)
published on: friday - 0.05% (3)
pill for the - 0.05% (3)
one of the - 0.05% (3)
somehow is not. - 0.05% (3)
air, computation, cryptography, - 0.05% (3)
“cybercrime” — but - 0.05% (3)
it so happens - 0.05% (3)
the time of - 0.05% (3)
a “cybercrime” — - 0.05% (3)
on account of - 0.05% (3)
the answer is - 0.05% (3)
that it is - 0.05% (3)
computation, cryptography, friends, - 0.05% (3)
jb 0x1035a4 (gdb) - 0.05% (3)
smartprobe work with - 0.05% (3)
to make use - 0.05% (3)
posted in: bitcoin, - 0.05% (3)
the public key - 0.05% (3)
friends, mathematics, nonloper, - 0.03% (2)
that the pill - 0.03% (2)
phuctored ssh public - 0.03% (2)
in the probe - 0.03% (2)
complete ipv4 space. - 0.03% (2)
probe to work - 0.03% (2)
you have a - 0.03% (2)
friday september 23 - 0.03% (2)
scan of the - 0.03% (2)
is not. and - 0.03% (2)
a scan of - 0.03% (2)
the pill and - 0.03% (2)
or whatever other - 0.03% (2)
the complete ipv4 - 0.03% (2)
of the public - 0.03% (2)
intro: part i - 0.03% (2)
by stanislav 2 - 0.03% (2)
care and feeding - 0.03% (2)
for use with - 0.03% (2)
note: please read - 0.03% (2)
believe that the - 0.03% (2)
there is a - 0.03% (2)
listen to krebs - 0.03% (2)
we know it - 0.03% (2)
help me with - 0.03% (2)
published on: monday - 0.03% (2)
of the sage - 0.03% (2)
complete pill for - 0.03% (2)
september 23 2016 - 0.03% (2)
< encoded.txt) <(echo - 0.03% (2)
key is to - 0.03% (2)
is equal to - 0.03% (2)
a lamport public - 0.03% (2)
public key signature - 0.03% (2)
our lamport parachute - 0.03% (2)
in: chumpatronics, cryptography, - 0.03% (2)
$ ./lamport_mkpriv.sh 256 - 0.03% (2)
| xargs -n - 0.03% (2)
it is possible - 0.03% (2)
might it be - 0.03% (2)
public key crypto - 0.03% (2)
please read the - 0.03% (2)
sage smartprobe. published - 0.03% (2)
feeding of the - 0.03% (2)
if you want - 0.03% (2)
to see the - 0.03% (2)
– i.e. the - 0.03% (2)
stanislav 2 comments - 0.03% (2)
0x001035b5: 72 ed - 0.03% (2)
; do echo - 0.03% (2)
xxd -r -p - 0.03% (2)
$pkl | cut - 0.03% (2)
$(echo $pkl | - 0.03% (2)
private key is - 0.03% (2)
tr -d '\\\n' - 0.03% (2)
sha256sum pubkey.txt < - 0.03% (2)
<(echo "attack at - 0.03% (2)
< (./lamport_decode.sh sha256sum - 0.03% (2)
the care and - 0.03% (2)
intel cpu and - 0.03% (2)
cpu and motherboard? - 0.03% (2)
< privkey.txt > - 0.03% (2)
$ ./lamport_priv2pub.sh sha256sum - 0.03% (2)
done | xargs - 0.03% (2)
256 512 > - 0.03% (2)
the melting point - 0.03% (2)
a 256-bit payload. - 0.03% (2)
here we simply - 0.03% (2)
softwarearchaeology by stanislav - 0.03% (2)
so long as - 0.03% (2)

Here you can find chart of all your popular one, two and three word phrases. Google and others search engines means your page is about words you use frequently.

Copyright © 2015-2016 hupso.pl. All rights reserved. FB | +G | Twitter

Hupso.pl jest serwisem internetowym, w którym jednym kliknieciem możesz szybko i łatwo sprawdź stronę www pod kątem SEO. Oferujemy darmowe pozycjonowanie stron internetowych oraz wycena domen i stron internetowych. Prowadzimy ranking polskich stron internetowych oraz ranking stron alexa.