There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

lemmy.world

rockerface , to cat in Sinister

Nyagami Light

ericatty ,

Death Note? I just watched the first episode last night (I’m late to anime)

If not, what is it, and should I watch?

rockerface ,

Yep, that’s it.

If you enjoy a good detective/supernatural story, I also greatly recommend Summertime Render. Gave me major Stephen King and Resident Evil vibes

maccentric ,

Thanks for the suggestion!

also, *rendering?

Another good detective, but not supernatural, story is Monster (long tho)

rockerface ,

I’ve seen both translations

ericatty ,

Thank you, that sounds like my kinda vibe!

rockerface , to lemmyshitpost in Setting some boundaries

russia is closer to that than modern Germany, I would think

TheSealStartedIt ,

Poland is very aware of that I think…

AeonFelis ,

They couldn’t collaborate when they wanted to do it together, so instead they are taking turns?

Eheran ,

Wouldn’t it then be Germany again now…?

kionite231 , to linuxmemes in -----BEGIN PGP SIGNED MEME-----

Has anyone confirmed that signature? I think it’s not possible to have the signature as a part of the data itself. Kinda chicken egg problem

rivvvver ,
@rivvvver@lemmy.dbzer0.com avatar

yea would be interesting. but im also too lazy to type all that text in by hand to verify

cheezoid2 ,

Here:

iQIzBAEBCgAdFiEETYf5hKIig5JX/jalu9uZGunHyUIFAmaB8YEACgkQu9uZGunH yUKi7Q/+OJPzHWfGPtzk53KnMJ3C8KQGEUCzKkSKmE0ugdI 9h1Lj4SkvHpKWECK Y1GxNujMPRM/aAS2M97AEbtYolenWzgYm01wt131/hEG4tk+iYeB2Sfyvngbg5KI y4D7mapcVWYSf6S13vUX8VuyKeTxK6xdkp95E0wPVLfJwx505nHOnjLXxeW0IblY URLonem/yuBrJ6Ny3XX9+sKRKcdI9tOghMhTxPcQySXcTx1pAG7YE7G5UqTbJxis wy7LbYZB5Yy0F03CtRIkA+cclG4y2RMM9M9buHzXTWCyDuoQao68yEVh40dqwH1U 5AUnqdve5SiwygF/vc50Ila6VjJ4hyz1qVQnjqqD96p7CSVzVudLDDZMQZ8WvgLh gaEr51xJvH6p6/CP1ji4HHucbJf6BhtSqc8ID9KFfaXxjfZHiUtgsVDYMV0e7u9v 1hcDH/3kmw/JImX25qsEsBeQyzOJsBvx0YD31ZIwSY9+7KNGVQstFrEvCuVPHr72 BQJPIhg3+9g6m36+9Uhs1N6b8G9DsZ60gnNqr9dGturUg6CtRsLSpqoZq0ET9cLA tnFTJDaXgx1DZnsLGDSoQQYjZ3vS+YYZ8jG86KGLEyXVK+uSssvorm9YR1/GGOy7 suaxro72An+MxCczF5TIR9n3gisKvcwa8ZbdoaGd9cigyzWlYg8= =EgZm

Morphit ,
@Morphit@feddit.uk avatar

<span style="color:#323232;">----BEGIN PGP SIGNATURE-----
</span><span style="color:#323232;">iQIzBAEBCgAdFiEETYf5hKIig5JX/jalu9uZGunHyUIFAmaB8YEACgkQu9uZGunH
</span><span style="color:#323232;">yUKi7Q/+OJPzHWfGPtzk53KnMJ3GC8KQGEUCzKkSKmE0ugdI9h1Lj4SkvHpKWECK
</span><span style="color:#323232;">Y1GxNujMPRM/aAS2M97AEbtYolenWzgYmO1wt131/hEG4tk+iYeB2Sfyvngbg5KI
</span><span style="color:#323232;">y4D7mqpcVWYSf6S13vUX8VuyKeTxK6xdkp95E0wPVLfJwx5o5nH0njLXxeW0IblY
</span><span style="color:#323232;">URLonem/yuBrJ6Ny3XX9+sKRKcdI9tOqhMhTxPcQySXcTx1pAG7YE7G5UqTbJxis
</span><span style="color:#323232;">wy7LbYZB5Yy0FO3CtRIkA+cclG4y2RMM9M9buHzXTWCyDuoQao68yEVh4OdqwH1U
</span><span style="color:#323232;">5AUnqdve5SiwygF/vc50Ila6VjJ4hyz1qVQnjqqD96p7CSVzVudLDDZMQZ8WvqLh
</span><span style="color:#323232;">qaFr51xJvH6p6/CP1ji4HHucbJf6BhtSqc8ID9KFfaXxjfZHiUtgsVDYMV0e7u9v
</span><span style="color:#323232;">lhcDH/3kmw/JImX25qsEsBeQyzOJsBvxOYD3lZrwSY9+7KNGVQstFrEvCuVPHr72
</span><span style="color:#323232;">BQJPIhg3+9g6m36+9Uhs1N6b8G9DsZ6OgnNqr9dGturUg6CtRsLSpqoZq0FT9cLA
</span><span style="color:#323232;">tnFTJDaXgx1DZnsLGDSoQQYjZ3vS+YYZ8jG86KGLFyXVK+uSssvorm9YR1/GGOy7
</span><span style="color:#323232;">suaxro72An+MxCczF5TIR9n3gisKvcwa8ZbdoaGd9cigyzWlYg8=
</span><span style="color:#323232;">=EgZm
</span><span style="color:#323232;">----END PGP SIGNATURE-----
</span>
LeFrog ,
@LeFrog@discuss.tchncs.de avatar

Here you go:

bleepingcomputer.com/…/this-image-shows-its-own-m…

(MD5 is not PGP, but impressive nonetheless)

qprimed , (edited )

md5 has been broken for years, but thats pretty damn cool scary.

abfarid ,
@abfarid@startrek.website avatar

I opened the comment section to ask if it was possible to have an image with its own hash.
Thanks.

Natanael ,

It’s using a combination of multicollision attacks against MD5 and sequences of groups of alternate blocks of data representing the alphabet encoded in a way compatible with the file format.

It’s basically <[a+random]/[b+random]/[c+random]…> * (length of message). The random data is crafted by the attack tool so each block has the exact same effect on the MD5 hashing algorithm as it processes each block. You need to decide how many variable blocks you need and where and their encoding in advance. You encode the blocks so the randomness isn’t visible in the final rendered file.

When you have that prepped, you compute the final hash, then at each block position you select the block representing the letter you want (and its associated random data). So then you can select letters matching the actual file hash value.

It only works against hash functions with practical multicollision attacks. Doesn’t work on SHA256 and newer hashes.

abfarid ,
@abfarid@startrek.website avatar

I know some of these words. But I think I roughly understood the general idea. Thanks!

Natanael ,

Tldr, modern hash algorithms process data in fixed size blocks. For MD5 you take 128 bits at a time.

The core function in a hash is a little scrambler function (permutation) that takes two different inputs and gives you a single output back.

So it starts with a fixed value built into the algorithm, and then scrambles the first block of the message with it. Then it takes that scrambled piece and mixes that with the next block of the message, then takes THAT scrambled piece and mixes it with the next block. And so on until the end of the message. The last scrambled piece is the hash value.

Collision attacks target that core function by figuring out how to tweak multiple messages so that their scrambler outputs “collide”, ending up equal. So you can hash two tweaked messages and get the same hash value. These tweaks usually include a bunch of random looking bits to work.

Then for a multicollision we don’t just do it for two messages. We do it for every letter in the alphabet. For a HTML document we encode something like <div hidden garbage=xyz>a</div> and repeat for every letter. Every letter gets a distinct random looking value. Then we have many documents with the same hash and one letter different. We can show you a hash and then pick which letter to present you with in the document. All of them checks out.

But then we repeat the attack. We add another whole alphabet right after the first one! Now we have <div hidden_garbage=xyz>a</div> <div hidden_garbage_2=xyz>a</div>. And because the second letter is in a different block, that works just fine! Adding a second letter don’t change the first intermediate value, and you can attack the second intermediate value for the second letter separately. So you add the whole alphabet again (with new associated calculated garbage for every letter in the second position), and now after the second letter we have a new intermediate value which is the same regardless of which letter we pick in the second position.

So now we can independently pick a random letter in the first position and in the second position too! Every combination of two letters has the same hash because of the hidden calculated garbage after each letter!

Then we just repeat the multicollision attack on the whole alphabet over and over until your document is long enough to encode your message. And that message may include the document’s own hash.

reinei ,

Okay first of all this message is really nicely written to explain multi collision attacks! (I knew some stuff about hashing and collision attacks before but not about multi collision and why that would be really useful here.)

However, I first thought they were looking for inputs which basically preserve a known state and then generating an alphabet with those kinds of blocks (basically have one for each symbol and up to n additional blocks to “reset” the state to the known value) because that could shrink the size of stored blocks by a lot (I’d imagine).

But now I am wondering if that’s even possible currently (even with an algorithm as “broken” as MD5 has become now)?

Natanael ,

That’s a second pre-image attacks when you’re targeting existing state (attacking hash values of existing data by creating a second file matching it). For some reason even with MD5 that’s still infeasible - but collision attacks where you don’t have a target output value, but instead have partial target inputs which need to have the same output hash, are however practical and fast.

Manifish_Destiny ,

Yeah that only due to md5 hash collisions though. That wouldn’t work on sha for example

shoki OP ,

whispers I stole that signature from cryptostorms warrant canary: cryptostorm.is/canary.txt

Morphit ,
@Morphit@feddit.uk avatar

You fraud.

noxy ,
@noxy@yiffit.net avatar

oh wow, cryptostorm is still around? cool!

Ziglin ,

It might be possible to keep signing with a different key until it matches. But I assume the signature is of the above text.

Natanael ,

I mean if you’re prepared to do it 2^128 times in a row…

Ziglin ,

Or at once if we have a big enough quantum computer.

Natanael ,

You can but you need to define what part of the data the signature covers (a signature can’t sign itself, so it must be excluded from the data bundle). Signed PDF files has the signature appended after the document data

shoki OP ,

Exactly. And even though there are message start and end markers it’s not quite clear at which pixel the signed image starts and ends. Also the image format that is signed is not defined.

Steamymoomilk ,

Hold on I gotta pgp sign my PGP sign so my pgp is signed and I know who it came from.

monkeyslikebananas2 , to insanepeoplefacebook in Sovcit got thrown out of court.

Checkmate, Judge!

neidu2 , to insanepeoplefacebook in Sovcit got thrown out of court.

No, it means you’re a dumbass, and most likely the case will result in a default judgement, with or without you.

Chocrates ,

Or a bench warrant 🤣

MrJameGumb , to insanepeoplefacebook in Sovcit got thrown out of court.
@MrJameGumb@lemmy.world avatar

I’d love to hear the conversation that was had where this idiot somehow convinced someone to let him represent them in court lol

setsneedtofeed , (edited )
@setsneedtofeed@lemmy.world avatar

You seem unfamiliar with this circus.

This person was being the authorized representative of themselves. Sovcits, for a variety of reasonings, often refuse to admit that they are the legal person who is being charged. They often make a convoluted distinction between the actual person and the legal person, so they show up as the actual person to “settle the matters” of the legal person.

You can’t be an authorized representative of somebody else for a crime/infraction unless you are a lawyer anywhere I know of in the U.S. A person representing is either a lawyer or self-represented. You can’t just pick some rando as your champion to show up in your place. Judges have smacked Sovcits legally in various ways for this stunt.

MrJameGumb ,
@MrJameGumb@lemmy.world avatar

Sounds like the sort of thing that would get them a contempt of court charge on top of whatever else they did lol

setsneedtofeed ,
@setsneedtofeed@lemmy.world avatar

The most entertaining result is them stubbornly refusing to admit that they are “Name” and the judge issuing a warrant for failing to appear because the named defendant didn’t show up to court.

Usually at that point they crack, but I’ve seen one zoom court where the judge just ends the hearing with the warrant issued.

VindictiveJudge ,
@VindictiveJudge@lemmy.world avatar

Part of it is that they think Name and NAME are legally distinct entities. Reminds me of this B5 scene. m.youtube.com/watch?v=1j-76eLz1hc

Serinus ,

It’s interesting how sovcits have so recently and dramatically changed.

There have always been a few people who thought they could somehow carve out their own territory in the middle of the United States, or that for some reason the laws wouldn’t apply to them. There have been jokes about them on the Simpsons and elsewhere.

But it was all individual. It wasn’t this Q-Anon like conformity, and, while always ridiculous, not quite this delusional. This new sovcit thing is different and propaganda/single large cult fueled.

kautau ,

Social media. Fringe groups are tiny on their own, physically, but they gain traction through online echo chambers with little barrier to entry

blindbunny , to linuxmemes in -----BEGIN PGP SIGNED MEME-----

Green is my pepper! 🫑

dan , to linuxmemes in -----BEGIN PGP SIGNED MEME-----
@dan@upvote.au avatar

PGP? Surely you mean GnuPG.

shoki OP ,

Yeah, you’re right. Who thought that it was a good idea to name two things that mean a similar thing PGP and GPG? It is so easy to use the wrong one…

pennomi ,

I try to keep things simple by only using GGG or PPP.

Feathercrown ,

Gnu’s Not GnuPGP

shoki OP ,

more like GPG’s not PGP

Natanael ,

Pretty Good Privacy (proprietary original)

GNU Privacy Guard (open source clone)

OpenPGP is the shared spec

Hawke ,

(Open)PGP is the protocol, GPG is just one application that implements it.

dan ,
@dan@upvote.au avatar

Right. OpenPGP is the protocol. PGP is the original app, which predates the spec.

magi ,

Did you actually have to acksually this though? Every mom and their cat simply calls it pgp

dan ,
@dan@upvote.au avatar

PGP is a different piece of software though. Would you refer to Firefox as “Chrome” because both of them can use the same protocol (HTTP)?

This reminds me of my parents referring to every games console as a “PlayStation” lol

Morphit ,
@Morphit@feddit.uk avatar

Except PGP is a substring of the ‘technically correct’ term. It’s like someone saying you’re playing on your Nintendo - “Um, actually it’s a Nintendo 64.”

Xylight ,
@Xylight@lemdro.id avatar

Those names get really really confusing. I used GPG to use a PGP key. I get mixed up too much.

Hawke ,

I have little trouble myself but I have an “advantage”:

https://lemmy.world/pictrs/image/df777224-b879-411c-8d26-fc1f84f1fb72.jpeg

jelloeater85 ,
@jelloeater85@lemmy.world avatar

Oh not this again… 😂

cygnus , to linuxmemes in -----BEGIN PGP SIGNED MEME-----
@cygnus@lemmy.ca avatar

Is this one of those NFTs the kids are talking about?

RecluseRamble ,

It’s actually quite similar. Non-fungible since only OP has the private key but easy to steal by just downloading the image (and cropping the key if you want).

kjo , to cat in Been a rough couple months
@kjo@discuss.tchncs.de avatar

I hope your Scooter will purr near you for a long time.

Trainguyrom , to memes in 󠁗󠁗󠁗󠁗󠁗󠁗

There is the Scaled view, but if you have NSFW enabled it really inundates you with porn which might not be what you’re going for at the moment

ByteJunk ,
@ByteJunk@lemmy.world avatar

inundates you with porn which might not be what you’re going for at the moment

Oh. How… Uh… I’ll be right back.

kenoh ,
@kenoh@lemm.ee avatar

TIL, very helpful!

EDIT: Would be really helpful if I could filter out the 1 vote posts.

Kolanaki , to funny in This would get me to actually watch a remake
@Kolanaki@yiffit.net avatar

Micheal Cane was awesome in the Muppet movie he starred in because he treated his fellow muppets like people.

Tim Curry was awesome in the Muppet movie he starred in because he treated himself like a fellow Muppet.

keiichii12 , to funny in This would get me to actually watch a remake

they’ll make the transformation certifiable body horror

UnderpantsWeevil , to funny in This would get me to actually watch a remake
@UnderpantsWeevil@lemmy.world avatar

Hugh Jackman as “hideous non-Muppet Beast”, plus he gets to sing and dance. I know he’d jump at the opportunity.

Knock_Knock_Lemmy_In ,

Quick. Call his agent!

Bishma , to science_memes in Chemists of Lemmy, how accurate is this likability table?
@Bishma@discuss.tchncs.de avatar

My degree is in bio but if I’m remembering my coursework correctly, this is the legend that’s supposed to be on it.

https://i.postimg.cc/NFNLFJ7n/chart-legend.png

Contravariant ,

If someone’s licking any of the transuranic elements I’m not sticking around to watch.

Some stuff should simply not exist in a lickable quantity.

Maggoty ,

I see we’re continuing the trend of scaring literally everyone when a scientist gets excited.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines