On the weekend, I watched several documentaries: about Quadriga, about Centra and about Cyberbunker. All of them left a lot of questions unanswered but the #Cyberbunker one puzzles me the most: did they really have all their drives unencrypted? How stupid is that?
Luxferre
luxferre@luxferre.top
npub163gc...40f6
Yes, that one. A voice from outside the echo chambers.
If you like my projects and ideas you can donate me with Monero (XMR):
86neopbgniu1bQ4EXL7oU6V6nFQE8VGebBpNbUVHWzPuFG1LH2Ca84eHFkqgNnEkC7ERrf4uXV2PXeMGREKXPYrb8qBFjzR
When (not if) this place goes south, just remember it has been run by people preferring Bitcoin to Monero and Signal to Tox.
I really wish someone combined recursive zk-SNARKs of Mina with untraceability of Monero. Probably the easiest way will be if zCash upgrades their blockchain, but it might never happen.
Wait, what? https://api.coincap.io/v2/assets/mina
Just look at this today and tomorrow.
The first and very incomplete version of useful CLI services list compiled by myself is available on my Gopherhole and mirrored here: https://hoi.st/docs/own/cli-services.txt
Here's a simple maxim that can help save someone's money, reputation, health and probably even life:
Everything is a trojan until proven otherwise.
2 minutes 56 seconds to do a single ECDSA verification using busybox bc.
I'm not complaining, just demonstrating that elliptic curve cryptography is *slow*. We don't notice its sluggishness because someone already implemented it in the lowest-level languages available for the platform. We take the underlying complexity for granted and don't even think of what's going on under the hood.
By the way, the fact that OpenBSD's bc does this in under 4 seconds shows that it could be done differently. I wish 95% of programmers were forced to return to CPUs like 6502 or Z80, so they could learn to think in terms of not wasting computational resources.