Use tox nigger
Hello pol. Recently I've been messing around with a project called Keybase...
It doesn't matter if you are using AES-NI instructions or a simple XOR instruction for your encryption, since secondary processors in consumer CPUs are everywhere for "performance" clocking purposes. All these processors are hooked into the attached chipset as well the integrated Ethernet card or even worse wireless or integrated 3G/4G/5G for "IT support" reasons and so unless you're monitoring the radio signals of your computer or Ethernet cable with hardware that you have built yourself or know doesn't have any bugs in it, then you can't be sure all your key information is being transmitted without your knowledge.
This is why agencies have made it publicly a big deal about their inability to break bad guys using encryption, which true from a purely scientific perspective, means nothing when if they have as much information as the user of this encryption. This isn't to say I'm against the use of encryption, because the proofs for the correctness of the algorithms is correct. Just don't be awed when an agency is able to read your AES-512 encrypted harddrive because the key you used was stored by processor during the operation and either secretly held in some small NAND flash somewhere in the chipset or transmitted to the agency when you used the GPL tool with a known signature to do the operation, that you from a software perspective was completely secret.
yeah nah. If you didn't take care of the hardware before using OTP you might as well write your message in a plaintext TV advert.
pleb
you deserve what you get
good catch, thank you for pointing this out
Go ahead. Share it all. I'm on there and whatever you share I'm posting in the clear on Usenet.
Kill yourself redditwhore.
(1st pic) I used to hate that shit - deciphering that shit with a printed SOI.
took forever
Why not learn Navajo? It worked back when we fought the Nips.
True.
secure != convenient
lel