m0wer's avatar
m0wer
m0wer@sgn.space
npub1w3va...4c5c
JoinMarket NG
m0wer's avatar
m0wer 6 days ago
Since there is now joinmarket-ng and joinmarket-rs, it was time to create a repo for JoinMarket Protocol (JMP) Specifications. The idea is to separate the protocol and protocol extensions from the implementations, as done in BIPs, NIPs, NUTS, ...
m0wer's avatar
m0wer 1 week ago
TIL: there is a command for analyzing docker usage: `docker system df` image
m0wer's avatar
m0wer 2 weeks ago
very interesting tool: that's a big joinmarket transaction. it's interesting to see where funds come from and where they go. it incorrectly flags a change spent together with an equal amount, which is not really linking but probably just different makers keep in mind that it uses mempool.space API! don't use this tool directly for your transactions (use tor and even better your own mempool API)
m0wer's avatar
m0wer 3 weeks ago
Controversial take: cash is actually pretty great widely accepted, tons of privacy, good denominations for change, etc. And the inflation EUR or USD suffers in a week/month is negligible. I would prefer paying through LN at physical stores for convenience, but then the merchant loses privacy vs cash, and payments would fail more often. So I'd say the priority isn't to kill the only form of fiat that actually offers something. But to streamline Bitcoin on/off ramps and obviously setting up ATMs would be relatively easy (there are already many), but having to show your ID (in Spain) for that... Again something that's technically feasible but blocked by regulations. Same for traveling, the most convenient way to get local currency abroad is a BTC ATM.
m0wer's avatar
m0wer 1 month ago
Github Copilot subscription quota tracker ``` ── Copilot Premium Requests ───────────────────────── Entitlement : 1500 / month (48.4 / day) Used : 373 (24.9%) Remaining : 1127 ── Usage vs Month ─────────────────────────────────── Usage [████████▒▒▒░░░░░░░░░░░░░░░░░░░░░░░] 24.9% Month [███████████░░░░░░░░░░░░░░░░░░░░░░░] 32.3% (day 10/31) ── Pace Check ─────────────────────────────────────── Burn rate : 37.3 req/day (budget 48.4/day) Expected used: 483 Actual used : 373 Status : ✅ UNDER pace by 110 req (7.3%) · 2.3 days ahead ── Forecast ───────────────────────────────────────── Projected EOM: 1156 req (77.1% of entitlement) Quota runs out: after reset (~+111 req surplus) ```
m0wer's avatar
m0wer 1 month ago
A few days ago, a JoinMarket NG collaborator's GitHub account was deleted without previous warning. The account was a member of the joinmarket-ng organization and had just opened a Pull Request. Now GitHub is asking the collaborator some info but has not restored the account yet. Really annoying, because all the issues and PRs of the collaborator have suddenly disappeared! As always, a good chance to learn and strengthen our weak spots. Here is the complete mirror (code, issues, labels, milestones, PRs, ...) to CodeBerg: It works automatically using a GitHub personal token with read only access to what's already public. Here is the guide on how to do the mirroring: It did fail at first but ended up working after 3 or so retries. #JoinMarketNG
m0wer's avatar
m0wer 1 month ago
The problem with insufficient entropy at boot time: > In 2012, researchers scanned the whole internet and harvested public keys from TLS certificates and SSH hosts. They found that a handful of systems had identical public keys, and in some cases very similar keys (namely, RSA keys with shared prime factors): in short, two numbers, n = pq and n′ = p′q′, with p = p′, whereas normally all ps and qs should be different in distinct modulus values. After further investigation, it turned out that many devices generated their public key early, at first boot, before having collected enough entropy, despite using an otherwise decent PRNG (typically /dev/urandom). PRNGs in different systems ended up producing identical random bits due to a same base entropy source (for example, a hardcoded seed). From the book Serious Cryptography. F
m0wer's avatar
m0wer 1 month ago
> The 2G standard also defined A5/2, a cipher for areas other than the EU and US. A5/2 was purposefully weaker to prevent the use of strong encryption everywhere. From the book: Serious Cryptography. So basically they made 2G A5/1 cypher insecure accidentally, but from the beginning designed a weaker A5/2 for the rest of the world on purpose...