Message from C, C++ talks

June 2019

— The attack works because the program was able to read the source of randomness used in AES

— Meaning that it could effectively predict how the key changed

— "hey, implementing it is really hard and even the most extensively tested libaries have bugs"
"let's rewrite it from scratch, by myself"

Message permanent page

— 🤦🏻‍♂️

— 

>"hey, implementing it is really hard and even the most extensively tested libaries have bugs"

thats not what I said, wtf?

— Anyway, you are holding me up from workg

— No, that's what comes out from the discussion

— If you can't even agree on that, that you are living in your magical world of delusion and I won't try to get you of it :)

Message permanent page

— The start key is what you provide as 'password' (and it can be passed as input of a key derivation function)

Message permanent page

— It is exactly what you said

— /ban Srijan channel ad.

— Another one bites the dust...!
Banned Srijan.
Reason:
channel ad.

— No! They do a statistical analysis on the access pattern on the precomputed lookup tables. Please _read_ the stuff you share and quote.

Message permanent page

— Guys I have downloaded codeblocks but facing problem with it

— It's quite new to me