|
Peer to Peer The 3rd millenium technology! |
|
Thread Tools | Search this Thread | Display Modes |
08-06-03, 07:35 AM | #121 | |
yea, it's me.
Join Date: Jan 2002
Location: usa
Posts: 2,093
|
Quote:
Good question..............we need an absolute (not a perhaps) answer here i'd reckon. Still - ya never know who's Relating Important Associations to Aggressors ~or~ Making Problems Accelerate Amongst us. ~or~ Initiating SneakyProcedures. |
|
08-06-03, 07:57 AM | #122 |
my name is Ranking Fullstop
Join Date: Dec 2001
Location: Promontorium Tremendum
Posts: 4,391
|
morning Goldie
i helped myself to some of those classic CBSRMT episodes last night - how many of those can you get on a cd? |
08-06-03, 08:41 AM | #123 |
Earthbound misfit
Join Date: May 2001
Location: Moses Lake, Washington
Posts: 2,563
|
I leave for a couple of days and am hopelessly behind again. So here's my key.
WASTE_PUBLIC_KEY 20 1536 Mazer B6FEEF3C6319E648D7BDB3D67749652571066A6EAB5D9B32125824F7CE50 336EB181AEFAFEC4527FC74518B54F64BB8F35D62F96069B703DAD92D9A8 46B137C3100A40F78AC34A6ADE21AB5C738C05896535F698F8C9770D7899 DFFED417B9B564A80E11ABAA40F560A3649EF5A5B25D3E27B3B06540A5B2 915F1076EEBC0D90F4AF6FE432941AA971B213F4A51B16CCB631EA561879 54C392CE71FD5C8665386FFF39FD4AC853DD69096183443AB8A2F0AA06A9 59A30D2DCB1709DCEF2EC9090003010001 WASTE_PUBLIC_KEY_END |
08-06-03, 08:45 AM | #124 | |
Join Date: May 2001
Location: New England
Posts: 10,024
|
Quote:
wb mazer! - js. |
|
08-06-03, 09:38 AM | #125 |
Thanks for being with arse
Join Date: Jan 2002
Location: The other side of the world
Posts: 10,343
|
look guys i'm only just trying to learn this thing as well...but pleased to help
there is one that is far more knowlegable who sees all ... dare not mention an utterence of an utterence yes i am testing and u are quite correct sir ...maybe its just the ips that worry me... though they might not get in thru on"this" app...u know what i mean... pirate pete with his 1337 port scans ..sold out to cheap nasty riaa men types do they actually exist? are they reading my very words...?©2003 LOL |
08-06-03, 10:56 AM | #126 |
Earthbound misfit
Join Date: May 2001
Location: Moses Lake, Washington
Posts: 2,563
|
Well, waste is a lot better than Gnutella was when it first came out. I wonder how popular it will be.
|
08-06-03, 12:32 PM | #127 | |
Join Date: May 2001
Location: New England
Posts: 10,024
|
Quote:
if our networks success is any indication, i think every kid on the planet is going to love this. small groups of friends permanently connected to form massive harddrives. it's going to be as influential as frankel's gnutella, and even more subversive. plus, it works a lot better. searches are instant. keep handing out those subpoenas riaa and pretty soon you’ll have placed the world beyond your reach, and onto protected networks like waste. - js. |
|
08-06-03, 01:02 PM | #128 |
Thanks for being with arse
Join Date: Jan 2002
Location: The other side of the world
Posts: 10,343
|
always room for a few more ...
its been going 212450 seconds or 3540 minutes or 59 hours...
|
08-06-03, 08:15 PM | #129 | |
Bumbling idiot
Join Date: Feb 2002
Location: Vancouver, CA
Posts: 787
|
Quote:
The network name prevents network collisions, so that if you inadvertantly join two networks they won't crosscontaminate each other. There are also session keys which prevent decoding of recorded encrypted streams, but I don't know much about this scheme. |
|
08-06-03, 08:43 PM | #130 | |
Join Date: May 2001
Location: New England
Posts: 10,024
|
Quote:
but if you keep the name of your network private, outsiders can’t get on at all. since friends, families and most groups aren’t going to be posting their network names on bulletin boards, let alone their keys (unlike we brave souls here at napsterites) these networks will be humming along in blissful obscurity all over the internet, and exchanging a lot of data easily and efficiently. you can expect this will make a lot of people very happy, and a handful of people very nervous. welcome to the future. again. - js. |
|
08-06-03, 08:46 PM | #131 |
my name is Ranking Fullstop
Join Date: Dec 2001
Location: Promontorium Tremendum
Posts: 4,391
|
in other words, someone could theoretically monitor you as an individual, from info gleaned from your posted public key, but they would not be able to monitor the network. so posting public keys is maybe not a smart idea?
btw, pod - i think you got more stuff that i never heard of than anybody i ever came across online.... |
08-06-03, 08:53 PM | #132 |
Thanks for being with arse
Join Date: Jan 2002
Location: The other side of the world
Posts: 10,343
|
i think the general idea would be not to
be quite so public.... but this is a sort of review on the fly i guess... |
08-06-03, 09:09 PM | #133 |
Earthbound misfit
Join Date: May 2001
Location: Moses Lake, Washington
Posts: 2,563
|
It's not unsafe to post public keys because public keys are used for encripting info, and the private keys are used to decrypt it. To read messages on the network without logging on someone would have to steal someone else's private key. It's okay to post your public key, but it's dangerous to import a public key from somebody you don't know.
It would be a good idea to change the netowork name, though. We don't even have to disconnect to do it, I don't think. |
08-06-03, 10:14 PM | #134 |
Thanks for being with arse
Join Date: Jan 2002
Location: The other side of the world
Posts: 10,343
|
ok i am into changing the name...
if we all can get in to one of the rooms@the.same.time... |
09-06-03, 01:36 AM | #135 | |
Bumbling idiot
Join Date: Feb 2002
Location: Vancouver, CA
Posts: 787
|
Quote:
When you create your private key, and 'mirror image' public key is created. These are based on some mathematical properties of prime numbers; you pick big enough prime numbers and it becomes computationally infeasible to brute force the private key. You hold on to your private key, and keep it safe. It's very important. The private key is also protected by a password (more usually and passPHRASE); it is never stored in plaintext. A message encrypted with your private key will be readable by anyone who has your public key. You publish your public key so that when people use it to decrypt this message they are sure it came from you, because only you have the corresponding private key that could be used to create the message. When someone wants to send you something that only you can decrypt, they encrypt it with your public key. Now only your private key can decrypt it, and since, again, you're the only person who knows it, only you can decrypt that message. So if you want secure comms, you exchange your public keys, and send messages to each other using the other's public key. This how WASTE works. You need everyone's public keys because they all send messages using their private key. Except since it's a network with routing and proxies and such, if you have 3 people, A, B and C, if A sends a message to B, this message could pass through C, which would be able to decode it. IOW, this is not like FreeNet, where the security is end to end and you can't read what's passing through your node (unless it's for you); and this is why you only let trusted people on your network and use a network name to obfuscate matters. A neat side-effect of this public/private scheme is that if you run a message through a one-way hash function and create a message digest (MD5 does this for example) and encrypt it with your private key, you've created a signature. So you send the signature and the message together (as is or encrypted with receipient's public key), and the recipient can now verify that the message: a) has not been altered b) was sent by you |
|
09-06-03, 01:47 AM | #136 | |
Bumbling idiot
Join Date: Feb 2002
Location: Vancouver, CA
Posts: 787
|
Quote:
|
|
09-06-03, 03:41 AM | #137 |
Arggggghhhhhh!!!!!
Join Date: Mar 2001
Location: Middle Earth
Posts: 2,891
|
Great post Pod I learnt heaps ty
Oh I just love this bit too:......and this is why you only let trusted people on your network and use a network name to obfuscate matters. OMG!! just gotta looooove that word..obfuscate I bet Ramona is spewing he didn't post it first. What the hell does it mean? |
09-06-03, 03:46 AM | #138 | ||
Madame Comrade
Join Date: May 2000
Location: Area 25
Posts: 5,587
|
Quote:
This being said, what Pod says is correct too: private keys can also be used to encrypt data - a handy feature for message source autenthication. Quote:
- tg |
||
09-06-03, 08:45 AM | #139 |
Join Date: May 2001
Location: New England
Posts: 10,024
|
waste users:
the network has a new name. pm for details. - js. |
09-06-03, 08:56 AM | #140 |
Posts: n/a
|
this is really such a great thread ... you really know your stuff ...
i noticed that some of you had trouble connecting ... did anyone get a message, when you couldn't connect, saying that it was possibly due to a firewall? just curious ... i don't know what happened, but a friend & i set ours up & we used it & it was working great. then the next time i tried to connect, i couldn't connect, & i got that error message. really frustrating, because it worked so great the 1st time & i didn't change anything (except entering the new ip address) ... i can't imagine what happened the 2nd time. i'm tempted to uninstall & install it again ... what do you think?? thanks for listening ... : ) |
Thread Tools | Search this Thread |
Display Modes | |
|
|