The algorithm has been nailed down. Branch elimination core has been corrected and the new model uses logical ANDs to select the branch with the lowest possible child node values based on a metric of entropy.
non-trivial branches have been reduced from e-1 to 0 per base 10 digit of a key.
Testing in progress.
edit: Locked down problem runtime. O(1) space complexity. O(log10 n) time complexity. We're solid. Still generalizing code. 13-17 hours of work left by my estimate, mostly battle testing and extending to the full range to run with the push of a button.
I'll pray for you when you're sitting in the dark feeling dumb and unprepared. Go buy food, and gas, tonight dumb-ass. Thats the only kindness I can offer you.
We're all gonna be up shits creek very soon. The only question is if you're gonna be one of the ones who bought a paddle before it happens.
I'll message you tomorrow when you have passed your deadline and have failed to deliver what you have over promised and I will expect an apology for wasting my time.
23 hours and counting. At least promise you'll shut the fuck up when the deadline passes and nothing happens, because you're a faggot and sucking dicks doesn't actually break cryptography.
[ - ] prototype [op] 1 point 9 monthsJul 17, 2024 17:10:21 ago (+1/-0)
Do you mind if I whittle something nice for gram gram?
it is always kind and good to whittle something nice for gram gram. I mean thats not how I would spend my last hours before shtf but it sounds as good as any.
No he doesn't. How does a bad update relate in any way to breaking cryptography?
There is zero relationship between Crowdstrike bricking their hardware with bad updates and what prototype was trying to claim. 90% of what that guy types is literal word salad. He misuses almost all the terminology he squeezes in.
None of what he predicted has happened, nor will it happen. The guy is a complete larping clown.
EDIT - LOL at the down vote. Smoke a little more hopium retards.
I didnt dv you, and i really dont know shit about any of this stuff but it was definitely interesting to see all the issues with different systems all over
The chans are controlled and forum slid if the u.s. government's social media monitors determine they don't want people seeing a post. Been so long since I was on 4chan, they probably just invisibly censor truly dangerous posts automatically now.
This means that every single API is hours away from being public knowledge. Yes, 100% of banks, public facing entities, digital payment processing... Any recommendations on how to secure personal assets?
It is not my purview to give financial advice. I am sure you have enough common sense to come up with some of your own ideas and consult your financial advisor.
Can you explain that in a little more basic English?
So you're eliminating branches that have in other words possible choices of passwords that have a less chance of being correct?
And you're selecting based on the lowest possible child node branches based on entropy? Lowest possible child mode branches does that mean the ones with the least possible number of wrong guesses?
Entropy? what how do you use entropy in this situation what do you mean by entropy?
And you reduced by many facter the number of possible choices?
It is based on something close to the inversion of an algorithm called karatsuba's method.
At every digit of a number to be factored (we'll call this number we're factoring n), there are only so many numbers pq which will reproduce some number of digits in n.
Lets use an example.
Let our factors be p = 1934063 q = 527279903
n = pq = 1019792551035889
By doing this we can note a few things. Factorization is hard according to most known methods until now.
But we know for example, that whatever p and q are, their smallest digits (1's place and 10's) place, whatever they are, when multiplied together, must produce matching the 1's and 10s place of n. The 1's and 10's place of n equal 89. Go look at the example number again.
At minimum, whatever the unit digit (first digit) of n's factors p and q are, they must produce the digit '9' in the ones column of n.
We generate these combinations and filter for any that don't meet this criteria. In our example case, this produces the pairs [1, 9], [3, 3], and [7, 7]. These are the only digits that p and q can have in their 1's column. Granted this is a trivial case, because prime numbers (what we're looking to find as the factors of n) can only ever begin with 1, 3, 7, or 9. But I digress, because the method can be extended.
Next we need to find the possible digits at the tens and hundreds columns of p and q.
But we encounter a problem. Where before, a cryptographer might bruteforce factor a very large number, trying 0-9, then all the digits 10-90 in the tens column, and face combinatorial explosion, we still have multiple possible combinations to try.
My first go through had an average of 3 branches per column of a number I was trying to factor. Sometimes this exploded to 27 branches or more.
I had to have a way to filter these branches.
My initial approach would be to append all possible digits in front of our pairs, and score them based on how many digits they matched from n.
So for example if we had the possible partial pq pairs like so..
['1', '9'] ['3', '3'] ['7', '7']
we might do 01x09, 11x09, 21x09, and so on, all the way up to 9199. Likewise 03x03, 13x03, 23x03, all the way up to 93x99
Just picking at random, 93x99 equals 9207. We drop the digit at the largest magnitude (because it is often wrong, or doesn't match n, due to our estimates of p and q only being partial matches).
And if n = 1019792551035889 we can see that 93x9=9207 doesn't match any digits of n, so we can filter it.
That still doesn't deal with branching.
My next step was, for each branch, to generate all child nodes in the next largest column for p and q. I worked with a logical AND of the binary values of the possible descendant nodes, selecting for the smallest value, and logging both the branch and child node.
testing showed that the method indicated the correct branch to choose (the correct pair of digits to append to our partial estimates of p and q) and that this is convergent.
However after the first period (the first 3 digits converged on) this broke down.
I needed a new method.
So I tried the difference of the descendant nodes, and selected the branch with the child node that had the largest positive value of this process. And it worked for each subsequent digit after that.
Entropy:
To calculate the entropy of a branch, you look at the possible pairs of its child or descendant nodes, look at each half of a pair, log all unique values for all pairs for a branch's descendants, get the square of the number of the unique possible values, get the natural logarithm of that* value, and multiply by the boltzmann's constant.
In the case of the one's column in our example, our pairs are: ['1', '9'] ['3', '3'] ['7', '7']
Where the first pair ['1', '9'] has the unique numbers 21, 09, 31, 19, or four unique elements, giving us an entropy of log(4^2)x1.380649e-23 3.8279718467716317e-23 and we can do the same exercise for the second pair, determining its unique elements are 03, 63, 13, 53, 23, 43, 83 and the second pair's entropy is thus.. log(7^2)x1.380649e-23 = 5.373237802766139e-23
and lastly the third pair's entropy is log(3^2)x1.380639e-23 3.033573943228901e-23
> And you reduced by many factor the number of possible choices?
In the initial case I reduced the search space per digit of n's possible factors, from 10 possible digits, to 3 unique pairs.
Most everything is explained in this comment, and this is the method at its core.
I'm currently just battle testing it especially the branch pruning algorithm, and generalizing it to run on its own instead of the manual chunks I've been modifying and running by hand up till now.
edit: replaced asterisks with x's, because the standard multiplication notation gets treated as comment formatting.
So you're saying you have a simple hieuristic for pruning most combinations at each level, to reduce the combinatorial explosion? You get it down to 3 branches for each digit? (so 3^n digits total combinations to test)
It seems disproving this would simply be constructing a test case where the hieuristic prunes an essential branch that the solution is on, preventing ever finding it. Given that it doesn't look at the entire number (just a few digits initially?), it seems like it wouldn't be hard to find such cases.
This is one of the difficulties that cropped up late. Dynamic programming with kernal methods will likely solve it.
Most of the test cases pass, but theres always the one or two that are sticky.
So for estimating the digits in the ones column of p and q, we have an average of 3 branches. I then generate downstream nodes for the tens columns for each possible pair of digits in the ones. The modified heuristic I wrote then decides which branch to select from these, which work out in the current version to 100 branches or less.
The tens column branch that is selected (having pruned the other 99 possible pairs for the tens column), then has in turn 100 descendants generated for it, and in that set, is the branch which will have the correct pair of digits for the hundreds columns of p and q, converging on a set that has the correct answer among it.
In practice it just works and I've extended it to pretty reliably give me 3-5 digits of p, and 3-5 digits of q.
But the key thing is we're never dealing with more than 100 descendant nodes at any given time, and no branch searching other than testing the descendants themselves for n mod node == 0 (because if p is the smaller of the two factors, we can't generate more digits for it then actually exist, naturally).
Works changing pretty fast in any case, and having been at this long enough, and already being familiar with the technique, I'm pretty confident dynamic programming and a basic evolutionary system will sufficiently refine the branch pruning formula in a way that will preserve the time and space complexity.
Since you're using entropy comparatively, why multiple everything by the Boltzman constant? As the name implies, it's a constant. You're just scaling everything unnecessarily and increasing computational overhead.
To sidestep your question, all communication relies on cryptography to ensure privacy. Cryptgraphy use multiplication of prime numbers at it's core. If you can know the prime numbers, you can decrypt the message. Being able to quickly factor a large number with only two factors, the prime numbers, would break all communication privacy as we know it.
Though I have reason to believe it will affect the security of elliptic curve cryptography, yes. Right now the extensions to that are all theoretic, and would probably take me four more years of throwing shit at the wall to find a solution for elliptics even with the new insights and methods.
ECM is good but only works up to a limit far below the average key size. I wrote an algorithm about a year ago that converts very large semiprimes outside the range of ecm, to composites within the range of ecm. It was an undiscovered variation on modular exponentiation. Basically the way it worked is for a given value of i, if you plugged it in took a semiprime pq, and returned a composite m, such that m%q = 0, but m%p = r. In otherwords it let you find composites that shared one of the factors of n, but not the other. And repeating this process would bring it into the range of ECM, which was a good start.
The problem was the value i had to be exactly equal to p/2. I used some automated code to find variations that worked for values of p/4 and p/16, but they wouldn't work if the resulting composite would have factors of 3, 11, and so on.
The ECM work was interesting as an exercise, but for the given time and research effort it was ultimately a dead end.
The media is not going to exist 24 hours from now, nor will law enforcement.
Whose going to pay their checks when theres no financial system and ww3 has kicked off so governments around the world have an excuse to manage the chaos?
I wrote elsewhere I had Assange Wikileaks torrent vibes.
It doesn't matter at this point. And thats the beautiful thing. I said at the beginning the u.s. government would likely disappear me or kill me when this gets out, maybe even before.
But the problem with that is I've already posted the basic premise and break down. Any competent cryptographer or programmer can reconstruct what I'm doing based just on the description in my comments and posts so far.
I guarantee you someone has already archived it and several are likely already working on reconstructing the algorithm from scratch just based on the description of it.
Put it this way, even if the incompetent u.s. officials had some red klaxon hollywood-style bullshit meeting room for emergencies where they were personally reviewing my posts as I type this very comment, and sweating bullets over it..if they were sending people from langley to my home right now, or a drone, it will be entirely irrelevant whether they arrive five hours from now or five minutes. The reality is they're probably not even aware. Some analyst thats been over-educated has looked at the premise, and beautifully, made the mistake of dismissing it as mere craziness. Bless their stupidity.
The description of the algorithm is posted, and others are going to exploit it.
I wouldn't doubt the chinese, the russians, the israelis, the iranians, the brits, and a raft of others have already copied the posts, even if they aren't yet aware of what their automated archives of 'extremists websites' have picked up, not to mention u.s. and israeli corporations that troll for 'threat monitoring' metrics they sell to private and public partners.
It's all over but the crying when the pension system goes down.
So whats this mean to me? My bitcoin wallet is no good?
hashes can't be broken that I know of.
But online sites that secure bitcoin wallets behind things like RSA can. Not that I'd personally do that, I'm uninterested in breaking any laws.
This entire thing entirely relies on the premise that it is perfectly legal to publish mathematics, any mathematics, even if whats published is incredibly fucking damaging to governments and financial markets around the world. There is no intent to harm anyone, even if I suspect what others will do with the code.
They made dissent and violent revolt not just impossible, but censored even the right to organize to merely protest. That is what this is about. If we can't revolt even peacefully without framejobs and bust-up operations by domestic federal agencies dressing like us and committing violence, then we won't ever resort to protest, or peaceful means again.
We won't even resort to organized violence, the sort, like two fellows who come to blows, might lead to both sides calling armistice, sueing for peace, and realizing reforms need to be passed and bad faith actors need the boot. Systems should leave room for at least a little revolt, peaceful or otherwise, as a check on when they've gone too far and have ossified too much to realize it.
There is no longer that possibility, and I have done the logistical math to be certain of that.
And so, we the american people, those of us who have had enough of the finger wagging, the calls to violence, the double standards, the raids, the lockdowns, the endless being shoved aside for global interests, the censorship, the calls to censor, disarm, tax out of exist, the untouchable status of the university-trained politicians and corporate class--thoseo f us tired of these things failing to reform or face consequences, will simply peacefully, lawfully release something that the worst elements in governments and NGOs around the world, will use to absolutely destroy each other into the digital stone age.
Isn't this what jews would want? To fully reset the financial system and then control it? The replacement system won't be any better. It will be worse. After much death and destruction.
I doubt it. It's going to be every NGO, every nation, every corporation, every politician, every official's dirty laundry out in the open.
You can't control people if your blackmail and bribery networks go public.
This will be healthier for everyone, even for the jews. The war of all against all. A good clean fight when everyone has every reason to be upset at everyone else on the world stage.
If any of us survive the consequences of this for the globe, no one is going to give a shit. You're either going to be making money selling hard goods, physical arbitrage as it were, or you're going to be farming potatoes six months from now.
[ + ] Crackinjokes
[ - ] Crackinjokes 0 points 3 monthsJan 24, 2025 05:05:31 ago (+0/-0)
[ + ] prototype
[ - ] prototype [op] 0 points 3 monthsJan 26, 2025 14:50:44 ago (+0/-0)
About 2-3 steps.
I still have bills to pay so I've been at work constantly.
[ + ] Love240
[ - ] Love240 11 points 9 monthsJul 17, 2024 11:14:26 ago (+11/-0)
2 more weeks!
[ + ] prototype
[ - ] prototype [op] 3 points 9 monthsJul 17, 2024 11:17:40 ago (+3/-0)
less than 2 days.
[ + ] Love240
[ - ] Love240 4 points 9 monthsJul 17, 2024 11:31:15 ago (+4/-0)
[ + ] prototype
[ - ] prototype [op] 2 points 9 monthsJul 17, 2024 14:23:45 ago (+2/-0)
[ + ] Love240
[ - ] Love240 3 points 9 monthsJul 17, 2024 14:24:56 ago (+3/-0)
[ + ] prototype
[ - ] prototype [op] 0 points 9 monthsJul 17, 2024 14:30:05 ago (+1/-1)
I'll pray for you when you're sitting in the dark feeling dumb and unprepared.
Go buy food, and gas, tonight dumb-ass. Thats the only kindness I can offer you.
We're all gonna be up shits creek very soon. The only question is if you're gonna be one of the ones who bought a paddle before it happens.
[ + ] Deleted
[ - ] deleted 4 points 9 monthsJul 17, 2024 14:40:18 ago (+4/-0)
[ + ] Love240
[ - ] Love240 4 points 9 monthsJul 17, 2024 14:45:08 ago (+4/-0)
[ + ] prototype
[ - ] prototype [op] 1 point 9 monthsJul 17, 2024 15:24:09 ago (+1/-0)
You won't even be able to get money out of the fucking atm.
[ + ] Love240
[ - ] Love240 5 points 9 monthsJul 17, 2024 15:38:57 ago (+5/-0)
[ + ] Whatthefuck
[ - ] Whatthefuck 3 points 9 monthsJul 17, 2024 16:27:29 ago (+3/-0)
[ + ] prototype
[ - ] prototype [op] 1 point 9 monthsJul 17, 2024 16:38:29 ago (+1/-0)
When the deadline passes I'll have shut the fuck up alright.
Because you won't have internet to read any more posts.
What is hard to comprehend about this?
And the estimate now stands at 14-18 hours to finish up the remaining work.
[ + ] Monica
[ - ] Monica 2 points 9 monthsJul 17, 2024 17:06:33 ago (+2/-0)
[ + ] prototype
[ - ] prototype [op] 1 point 9 monthsJul 17, 2024 17:10:21 ago (+1/-0)
it is always kind and good to whittle something nice for gram gram.
I mean thats not how I would spend my last hours before shtf but it sounds as good as any.
[ + ] Love240
[ - ] Love240 1 point 9 monthsJul 17, 2024 15:29:47 ago (+1/-0)
[ + ] Trope
[ - ] Trope 1 point 9 monthsJul 17, 2024 20:47:52 ago (+1/-0)
And what are you planning to hack first with your ability to unencrypt stuff? Don’t answer cryptically.
[ + ] prototype
[ - ] prototype [op] 1 point 9 monthsJul 17, 2024 22:48:30 ago (+1/-0)
I plan on hacking nothing.
What others do with it is their own prerogative and I'm not responsible for what they do.
[ + ] Love240
[ - ] Love240 1 point 9 monthsJul 18, 2024 12:04:21 ago (+1/-0)
[ + ] Deleted
[ - ] deleted 1 point 9 monthsJul 18, 2024 12:10:33 ago (+1/-0)
[ + ] Oz5711
[ - ] Oz5711 0 points 9 monthsJul 19, 2024 15:22:04 ago (+0/-0)
[ + ] albatrosv15
[ - ] albatrosv15 3 points 9 monthsJul 17, 2024 17:35:53 ago (+3/-0)
[ + ] aboutime
[ - ] aboutime 2 points 9 monthsJul 19, 2024 06:23:49 ago (+2/-0)
[ + ] Deleted
[ - ] deleted 0 points 9 monthsJul 19, 2024 06:38:40 ago (+0/-0)
[ + ] paul_neri
[ - ] paul_neri 2 points 9 monthsJul 19, 2024 05:00:14 ago (+2/-0)
[ + ] Whatthefuck
[ - ] Whatthefuck 5 points 9 monthsJul 17, 2024 16:25:29 ago (+5/-0)
[ + ] prototype
[ - ] prototype [op] 2 points 9 monthsJul 17, 2024 16:34:34 ago (+2/-0)
At minimum, even if you don't believe me, go buy a box of ammo and a can of spam.
At least you won't be left with your dick in your hand.
[ + ] Whatthefuck
[ - ] Whatthefuck 3 points 9 monthsJul 17, 2024 17:02:11 ago (+3/-0)
[ + ] ButtToucha9000
[ - ] ButtToucha9000 2 points 9 monthsJul 17, 2024 20:25:13 ago (+2/-0)
[ + ] prototype
[ - ] prototype [op] 1 point 9 monthsJul 17, 2024 22:47:14 ago (+1/-0)
Woe is me, I'll never recover from this oversight.
[ + ] Whatthefuck
[ - ] Whatthefuck 1 point 9 monthsJul 18, 2024 10:18:06 ago (+1/-0)
[ + ] JudyStroyer
[ - ] JudyStroyer 1 point 9 monthsJul 19, 2024 08:10:04 ago (+1/-0)
[ + ] Whatthefuck
[ - ] Whatthefuck 0 points 9 monthsJul 19, 2024 09:31:03 ago (+1/-1)*
There is zero relationship between Crowdstrike bricking their hardware with bad updates and what prototype was trying to claim. 90% of what that guy types is literal word salad. He misuses almost all the terminology he squeezes in.
None of what he predicted has happened, nor will it happen. The guy is a complete larping clown.
EDIT - LOL at the down vote. Smoke a little more hopium retards.
[ + ] JudyStroyer
[ - ] JudyStroyer 1 point 9 monthsJul 19, 2024 14:45:21 ago (+1/-0)
[ + ] Whatthefuck
[ - ] Whatthefuck 1 point 9 monthsJul 19, 2024 20:35:54 ago (+1/-0)
[ + ] Deleted
[ - ] deleted 1 point 9 monthsJul 17, 2024 16:59:02 ago (+1/-0)
[ + ] Razzoriel
[ - ] Razzoriel 5 points 9 monthsJul 17, 2024 15:01:28 ago (+5/-0)
[ + ] Oz5711
[ - ] Oz5711 2 points 9 monthsJul 18, 2024 14:54:09 ago (+2/-0)
[ + ] Deleted
[ - ] deleted 1 point 9 monthsJul 19, 2024 07:25:06 ago (+1/-0)
[ + ] TheSimulacra
[ - ] TheSimulacra 2 points 9 monthsJul 18, 2024 13:28:25 ago (+2/-0)
[ + ] SilentByAssociation
[ - ] SilentByAssociation 4 points 9 monthsJul 17, 2024 15:10:17 ago (+4/-0)
[ + ] prototype
[ - ] prototype [op] 4 points 9 monthsJul 17, 2024 15:21:54 ago (+4/-0)
I'm going to post the entire source code for everyone.
[ + ] MaryXmas
[ - ] MaryXmas 4 points 9 monthsJul 17, 2024 13:49:52 ago (+4/-0)
[ + ] prototype
[ - ] prototype [op] 5 points 9 monthsJul 17, 2024 14:01:14 ago (+5/-0)
[ + ] NegaroNegaroNeeegaro
[ - ] NegaroNegaroNeeegaro 2 points 9 monthsJul 18, 2024 06:18:19 ago (+2/-0)
[ + ] DitchPig
[ - ] DitchPig 3 points 9 monthsJul 17, 2024 15:07:13 ago (+3/-0)
[ + ] Deleted
[ - ] deleted 3 points 9 monthsJul 17, 2024 15:16:09 ago (+3/-0)
[ + ] prototype
[ - ] prototype [op] 3 points 9 monthsJul 17, 2024 15:20:01 ago (+3/-0)
lol.
[ + ] Sector2
[ - ] Sector2 3 points 9 monthsJul 17, 2024 14:51:09 ago (+3/-0)
[ + ] prototype
[ - ] prototype [op] 2 points 9 monthsJul 17, 2024 15:19:40 ago (+2/-0)
[ + ] MaryXmas
[ - ] MaryXmas 3 points 9 monthsJul 17, 2024 13:55:29 ago (+3/-0)
[ + ] JudyStroyer
[ - ] JudyStroyer 7 points 9 monthsJul 17, 2024 14:02:25 ago (+7/-0)
Secure the future of our people
[ + ] Deleted
[ - ] deleted 4 points 9 monthsJul 17, 2024 13:59:47 ago (+4/-0)
[ + ] prototype
[ - ] prototype [op] 0 points 9 monthsJul 17, 2024 13:59:46 ago (+0/-0)
[ + ] MaryXmas
[ - ] MaryXmas 1 point 9 monthsJul 17, 2024 22:09:02 ago (+1/-0)
[ + ] letsgetit
[ - ] letsgetit -1 points 9 monthsJul 17, 2024 16:10:06 ago (+0/-1)
[ + ] MaryXmas
[ - ] MaryXmas 0 points 9 monthsJul 17, 2024 22:10:52 ago (+0/-0)
[ + ] Crackinjokes
[ - ] Crackinjokes 3 points 9 monthsJul 17, 2024 11:39:56 ago (+3/-0)
So you're eliminating branches that have in other words possible choices of passwords that have a less chance of being correct?
And you're selecting based on the lowest possible child node branches based on entropy? Lowest possible child mode branches does that mean the ones with the least possible number of wrong guesses?
Entropy? what how do you use entropy in this situation what do you mean by entropy?
And you reduced by many facter the number of possible choices?
[ + ] prototype
[ - ] prototype [op] 4 points 9 monthsJul 17, 2024 12:32:29 ago (+4/-0)*
At every digit of a number to be factored (we'll call this number we're factoring n), there are only so many numbers pq which will reproduce some number of digits in n.
Lets use an example.
Let our factors be
p = 1934063
q = 527279903
n = pq = 1019792551035889
By doing this we can note a few things. Factorization is hard according to most known methods until now.
But we know for example, that whatever p and q are, their smallest digits (1's place and 10's) place, whatever they are, when multiplied together, must produce matching the 1's and 10s place of n. The 1's and 10's place of n equal 89.
Go look at the example number again.
At minimum, whatever the unit digit (first digit) of n's factors p and q are, they must produce the digit '9' in the ones column of n.
We generate these combinations and filter for any that don't meet this criteria.
In our example case, this produces the pairs [1, 9], [3, 3], and [7, 7].
These are the only digits that p and q can have in their 1's column.
Granted this is a trivial case, because prime numbers (what we're looking to find as the factors of n) can only ever begin with 1, 3, 7, or 9. But I digress, because the method can be extended.
Next we need to find the possible digits at the tens and hundreds columns of p and q.
But we encounter a problem. Where before, a cryptographer might bruteforce factor a very large number, trying 0-9, then all the digits 10-90 in the tens column, and face combinatorial explosion, we still have multiple possible combinations to try.
My first go through had an average of 3 branches per column of a number I was trying to factor.
Sometimes this exploded to 27 branches or more.
I had to have a way to filter these branches.
My initial approach would be to append all possible digits in front of our pairs, and score them based on how many digits they matched from n.
So for example if we had the possible partial pq pairs like so..
['1', '9']
['3', '3']
['7', '7']
we might do 01x09, 11x09, 21x09, and so on, all the way up to 9199.
Likewise 03x03, 13x03, 23x03, all the way up to 93x99
Just picking at random, 93x99 equals 9207. We drop the digit at the largest magnitude (because it is often wrong, or doesn't match n, due to our estimates of p and q only being partial matches).
And if n = 1019792551035889
we can see that 93x9=9207 doesn't match any digits of n, so we can filter it.
That still doesn't deal with branching.
My next step was, for each branch, to generate all child nodes in the next largest column for p and q.
I worked with a logical AND of the binary values of the possible descendant nodes, selecting for the smallest value, and logging both the branch and child node.
testing showed that the method indicated the correct branch to choose (the correct pair of digits to append to our partial estimates of p and q) and that this is convergent.
However after the first period (the first 3 digits converged on) this broke down.
I needed a new method.
So I tried the difference of the descendant nodes, and selected the branch with the child node that had the largest positive value of this process. And it worked for each subsequent digit after that.
Entropy:
To calculate the entropy of a branch, you look at the possible pairs of its child or descendant nodes, look at each half of a pair, log all unique values for all pairs for a branch's descendants, get the square of the number of the unique possible values, get the natural logarithm of that* value, and multiply by the boltzmann's constant.
In the case of the one's column in our example, our pairs are:
['1', '9']
['3', '3']
['7', '7']
And their descendants are..
['1', '9']: ['21', '09'], ['31', '19']
['3', '3']: ['03', '63'], ['13', '53'], ['23', '43'], ['43', '23'], ['53', '13'], ['63', '03'], ['83', '83']
['7', '7']: ['07', '27'], ['17', '17'], ['27', '07']
Where the first pair ['1', '9'] has the unique numbers 21, 09, 31, 19, or four unique elements, giving us an entropy of
log(4^2)x1.380649e-23
3.8279718467716317e-23
and we can do the same exercise for the second pair, determining its unique elements are 03, 63, 13, 53, 23, 43, 83
and the second pair's entropy is thus..
log(7^2)x1.380649e-23 = 5.373237802766139e-23
and lastly the third pair's entropy is
log(3^2)x1.380639e-23
3.033573943228901e-23
In the initial case I reduced the search space per digit of n's possible factors, from 10 possible digits, to 3 unique pairs.
Most everything is explained in this comment, and this is the method at its core.
I'm currently just battle testing it especially the branch pruning algorithm, and generalizing it to run on its own instead of the manual chunks I've been modifying and running by hand up till now.
edit: replaced asterisks with x's, because the standard multiplication notation gets treated as comment formatting.
[ + ] Monica
[ - ] Monica 8 points 9 monthsJul 17, 2024 12:46:55 ago (+8/-0)
SURE!
https://i.pinimg.com/originals/3d/b6/e6/3db6e6d365155b574e296603df39148c.jpg
[ + ] Prairie
[ - ] Prairie 3 points 9 monthsJul 17, 2024 19:58:36 ago (+3/-0)
It seems disproving this would simply be constructing a test case where the hieuristic prunes an essential branch that the solution is on, preventing ever finding it. Given that it doesn't look at the entire number (just a few digits initially?), it seems like it wouldn't be hard to find such cases.
[ + ] prototype
[ - ] prototype [op] 2 points 9 monthsJul 17, 2024 23:09:38 ago (+2/-0)
This is one of the difficulties that cropped up late. Dynamic programming with kernal methods will likely solve it.
Most of the test cases pass, but theres always the one or two that are sticky.
So for estimating the digits in the ones column of p and q, we have an average of 3 branches.
I then generate downstream nodes for the tens columns for each possible pair of digits in the ones.
The modified heuristic I wrote then decides which branch to select from these, which work out in the current version to 100 branches or less.
The tens column branch that is selected (having pruned the other 99 possible pairs for the tens column), then has in turn 100 descendants generated for it, and in that set, is the branch which will have the correct pair of digits for the hundreds columns of p and q, converging on a set that has the correct answer among it.
In practice it just works and I've extended it to pretty reliably give me 3-5 digits of p, and 3-5 digits of q.
But the key thing is we're never dealing with more than 100 descendant nodes at any given time, and no branch searching other than testing the descendants themselves for n mod node == 0
(because if p is the smaller of the two factors, we can't generate more digits for it then actually exist, naturally).
Works changing pretty fast in any case, and having been at this long enough, and already being familiar with the technique, I'm pretty confident dynamic programming and a basic evolutionary system will sufficiently refine the branch pruning formula in a way that will preserve the time and space complexity.
[ + ] JudyStroyer
[ - ] JudyStroyer 2 points 9 monthsJul 17, 2024 14:05:37 ago (+2/-0)
[ + ] prototype
[ - ] prototype [op] 3 points 9 monthsJul 17, 2024 14:20:44 ago (+3/-0)
I tried to make it as simple as possible, breaking down every step.
[ + ] KangzNSheeit
[ - ] KangzNSheeit 2 points 9 monthsJul 18, 2024 13:00:10 ago (+2/-0)
[ + ] CHIRO
[ - ] CHIRO 0 points 9 monthsJul 17, 2024 13:05:10 ago (+0/-0)
[ + ] prototype
[ - ] prototype [op] 4 points 9 monthsJul 17, 2024 14:23:02 ago (+4/-0)
The eggheads were wrong, lol.
break the world. break all the things.
we are giving back the future to those who had it stolen by international kleptocrats.
[ + ] fritz_maurentod
[ - ] fritz_maurentod 0 points 9 monthsJul 17, 2024 14:44:41 ago (+0/-0)
[ + ] TheYiddler
[ - ] TheYiddler 2 points 9 monthsJul 17, 2024 14:42:49 ago (+2/-0)
[ + ] ButtToucha9000
[ - ] ButtToucha9000 2 points 9 monthsJul 17, 2024 20:33:32 ago (+2/-0)
[ + ] clymer
[ - ] clymer 2 points 9 monthsJul 17, 2024 19:01:51 ago (+2/-0)
[ + ] big_fat_dangus
[ - ] big_fat_dangus 2 points 9 monthsJul 17, 2024 18:48:31 ago (+2/-0)
[ + ] DieselForever
[ - ] DieselForever 1 point 9 monthsJul 17, 2024 16:09:55 ago (+1/-0)
[ + ] prototype
[ - ] prototype [op] 2 points 9 monthsJul 17, 2024 16:36:54 ago (+2/-0)
Not familiar with that.
Though I have reason to believe it will affect the security of elliptic curve cryptography, yes. Right now the extensions to that are all theoretic, and would probably take me four more years of throwing shit at the wall to find a solution for elliptics even with the new insights and methods.
[ + ] DieselForever
[ - ] DieselForever 2 points 9 monthsJul 17, 2024 18:29:40 ago (+2/-0)
ED25519 is irrelevant really only used in SSH. Its also elliptic curve based. TLS doesn't use it afaik.
Well, gonna be giggles tomorrow if you are for real. RSA still used mainly everywhere
[ + ] happytoes
[ - ] happytoes 1 point 9 monthsJul 17, 2024 13:48:41 ago (+1/-0)
[ + ] prototype
[ - ] prototype [op] 3 points 9 monthsJul 17, 2024 13:55:13 ago (+3/-0)
It was an undiscovered variation on modular exponentiation. Basically the way it worked is for a given value of i,
if you plugged it in took a semiprime pq, and returned a composite m, such that m%q = 0, but m%p = r.
In otherwords it let you find composites that shared one of the factors of n, but not the other.
And repeating this process would bring it into the range of ECM, which was a good start.
The problem was the value i had to be exactly equal to p/2.
I used some automated code to find variations that worked for values of p/4 and p/16, but they wouldn't work if the resulting composite would have factors of 3, 11, and so on.
The ECM work was interesting as an exercise, but for the given time and research effort it was ultimately a dead end.
[ + ] Deleted
[ - ] deleted 1 point 9 monthsJul 17, 2024 12:50:59 ago (+1/-0)
[ + ] prototype
[ - ] prototype [op] 3 points 9 monthsJul 17, 2024 12:55:32 ago (+3/-0)*
Whose going to pay their checks when theres no financial system and ww3 has kicked off so governments around the world have an excuse to manage the chaos?
It's gonna be like Revelations.
We are starting Armageddon.
[ + ] Deleted
[ - ] deleted 1 point 9 monthsJul 17, 2024 13:43:57 ago (+1/-0)
[ + ] prototype
[ - ] prototype [op] 3 points 9 monthsJul 17, 2024 14:08:24 ago (+3/-0)
It doesn't matter at this point. And thats the beautiful thing. I said at the beginning the u.s. government would likely disappear me or kill me when this gets out, maybe even before.
But the problem with that is I've already posted the basic premise and break down. Any competent cryptographer or programmer can reconstruct what I'm doing based just on the description in my comments and posts so far.
I guarantee you someone has already archived it and several are likely already working on reconstructing the algorithm from scratch just based on the description of it.
Put it this way, even if the incompetent u.s. officials had some red klaxon hollywood-style bullshit meeting room for emergencies where they were personally reviewing my posts as I type this very comment, and sweating bullets over it..if they were sending people from langley to my home right now, or a drone, it will be entirely irrelevant whether they arrive five hours from now or five minutes. The reality is they're probably not even aware. Some analyst thats been over-educated has looked at the premise, and beautifully, made the mistake of dismissing it as mere craziness. Bless their stupidity.
The description of the algorithm is posted, and others are going to exploit it.
I wouldn't doubt the chinese, the russians, the israelis, the iranians, the brits, and a raft of others have already copied the posts, even if they aren't yet aware of what their automated archives of 'extremists websites' have picked up, not to mention u.s. and israeli corporations that troll for 'threat monitoring' metrics they sell to private and public partners.
It's all over but the crying when the pension system goes down.
[ + ] Deleted
[ - ] deleted 2 points 9 monthsJul 17, 2024 14:14:36 ago (+2/-0)
[ + ] fritz_maurentod
[ - ] fritz_maurentod 0 points 9 monthsJul 18, 2024 08:04:06 ago (+0/-0)
[ + ] HowDoYouDoFellowNiggers
[ - ] HowDoYouDoFellowNiggers 0 points 9 monthsJul 18, 2024 01:36:58 ago (+0/-0)
i'm still pissed i didn't make any money on it
fuck off
[ + ] prototype
[ - ] prototype [op] 0 points 9 monthsJul 18, 2024 02:25:02 ago (+0/-0)
Actually, if I were a financial advisor, and assuming everything weren't about to go tits up, I'd hold onto mine.
[ + ] HowDoYouDoFellowNiggers
[ - ] HowDoYouDoFellowNiggers 0 points 9 monthsJul 18, 2024 18:22:13 ago (+0/-0)
[ + ] qwop
[ - ] qwop 0 points 9 monthsJul 17, 2024 14:00:46 ago (+0/-0)
[ + ] prototype
[ - ] prototype [op] 4 points 9 monthsJul 17, 2024 14:13:42 ago (+4/-0)*
World War 3.
An actual great reset. Where the governments and billionaire oligarchs will own nothing, and be happy....that they're still alive.
If, that is, they survive, and are still alive after the shit hits the fan.
I don't know about them. I'll be busy smoking a cigarette and watching the sunset and listening for the drone strike coming my way.
[ + ] Niggly_Puff
[ - ] Niggly_Puff 0 points 9 monthsJul 17, 2024 12:02:02 ago (+1/-1)
[ + ] JudyStroyer
[ - ] JudyStroyer 4 points 9 monthsJul 17, 2024 14:07:22 ago (+4/-0)
[ + ] prototype
[ - ] prototype [op] 3 points 9 monthsJul 17, 2024 12:43:36 ago (+3/-0)
Those of us dedicated to falling on our sword to punish those who thought they could control and own everything without consequences.
[ + ] Special_Prosecutor
[ - ] Special_Prosecutor 0 points 9 monthsJul 17, 2024 11:25:15 ago (+0/-0)
[ + ] prototype
[ - ] prototype [op] 4 points 9 monthsJul 17, 2024 12:41:59 ago (+4/-0)
hashes can't be broken that I know of.
But online sites that secure bitcoin wallets behind things like RSA can. Not that I'd personally do that, I'm uninterested in breaking any laws.
This entire thing entirely relies on the premise that it is perfectly legal to publish mathematics, any mathematics, even if whats published is incredibly fucking damaging to governments and financial markets around the world. There is no intent to harm anyone, even if I suspect what others will do with the code.
They made dissent and violent revolt not just impossible, but censored even the right to organize to merely protest. That is what this is about. If we can't revolt even peacefully without framejobs and bust-up operations by domestic federal agencies dressing like us and committing violence, then we won't ever resort to protest, or peaceful means again.
We won't even resort to organized violence, the sort, like two fellows who come to blows, might lead to both sides calling armistice, sueing for peace, and realizing reforms need to be passed and bad faith actors need the boot.
Systems should leave room for at least a little revolt, peaceful or otherwise, as a check on when they've gone too far and have ossified too much to realize it.
There is no longer that possibility, and I have done the logistical math to be certain of that.
And so, we the american people, those of us who have had enough of the finger wagging, the calls to violence, the double standards, the raids, the lockdowns, the endless being shoved aside for global interests, the censorship, the calls to censor, disarm, tax out of exist, the untouchable status of the university-trained politicians and corporate class--thoseo f us tired of these things failing to reform or face consequences, will simply peacefully, lawfully release something that the worst elements in governments and NGOs around the world, will use to absolutely destroy each other into the digital stone age.
[ + ] Niggly_Puff
[ - ] Niggly_Puff 0 points 9 monthsJul 17, 2024 12:54:04 ago (+0/-0)
[ + ] prototype
[ - ] prototype [op] 2 points 9 monthsJul 17, 2024 12:57:23 ago (+2/-0)
You don't. But you will be finding out shortly that I am not.
[ + ] Niggly_Puff
[ - ] Niggly_Puff -1 points 9 monthsJul 17, 2024 13:08:22 ago (+0/-1)
[ + ] prototype
[ - ] prototype [op] 3 points 9 monthsJul 17, 2024 13:48:42 ago (+3/-0)
I doubt it. It's going to be every NGO, every nation, every corporation, every politician, every official's dirty laundry out in the open.
You can't control people if your blackmail and bribery networks go public.
This will be healthier for everyone, even for the jews.
The war of all against all. A good clean fight when everyone has every reason to be upset at everyone else on the world stage.
[ + ] prototype
[ - ] prototype [op] 3 points 9 monthsJul 17, 2024 13:00:25 ago (+3/-0)
If any of us survive the consequences of this for the globe, no one is going to give a shit.
You're either going to be making money selling hard goods, physical arbitrage as it were, or you're going to be farming potatoes six months from now.
[ + ] Zylazineinmypants
[ - ] Zylazineinmypants 1 point 9 monthsJul 17, 2024 11:47:24 ago (+2/-1)