This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Messages - fb39ca4
Pages: 1 ... 96 97 [98] 99 100 ... 126
1456
« on: November 16, 2010, 08:44:08 pm »
What I'm hoping is that someone figures out how to interpret/compile TI-BASIC or z80 ASM on the Prizm. The program selection for casios is quite aptly described as pitiful.
We can change that.
1457
« on: November 16, 2010, 05:16:04 pm »
Idk...
does anyone know? I would like to know.
Look underneath the keypad, where you can see it's connections, and check if they've been rubbed away.
1458
« on: November 15, 2010, 10:04:45 pm »
1996??? I thought my 1998 Dell "gaming computer" was old. Best of luck to you recovering your data.
1459
« on: November 15, 2010, 09:58:02 pm »
How does it get worn out? Is it the metal contacts on the keypad being rubbed away, or is it the metal strips on the calc losing their tension?
1460
« on: November 15, 2010, 09:53:44 pm »
That unlimited detail thing looks neat, though you would need a lot of RAM - a 1024x1024x1024 object would take up 1GB of RAM at 8bit color.
1461
« on: November 15, 2010, 06:36:27 pm »
What's the difference between chosen prefix and second preimage collisions?
1462
« on: November 15, 2010, 05:06:44 pm »
811. The programs you use to help you on tests are ASM programs, written with Mimas.
In my math class last year, the only cheating people ever did on tests was to write notes in programs.
1463
« on: November 15, 2010, 03:31:06 pm »
I'd like to know, how much work is it brute forcing a collision say, compared to factoring a 512 bit key? Also, I found this: http://eprint.iacr.org/2004/304.pdf, which has an algorithm to reduce the number of steps before a collision occurs.
1464
« on: November 14, 2010, 10:14:41 pm »
38. Have it take up 2/3 of the flash memory. 39. In subsequent updates, remove features, while blocking downgrading.
1465
« on: November 14, 2010, 10:02:01 pm »
Probably around the same. Of course, an extremely similar file would be much easier to compute than an extremely difficult one, and if we made the boot2 simply accept our own OS's key (which could be an extremely close semiprime number, but one we know the factors of ) it would boot the OS just fine, since it would operate the same from there on.
Huh? I don't get the similar semiprime thing.
1466
« on: November 14, 2010, 08:54:20 pm »
So how much work is it to compute a hash compared to doing a trial division?
1467
« on: November 14, 2010, 07:23:08 pm »
So how hard would it actually be? Would it involve doing 2^256 trials, or is there a faster way?
1468
« on: November 14, 2010, 06:11:03 pm »
So, could we attack boot2 by writing our own code, and appending more data to the end until we find something with the same hash as boot2?
1469
« on: November 14, 2010, 11:28:55 am »
Does anyone know the hash method used for signing the os/boot2? We could focus efforts on trying to crack the hash,if it is feasible.
1470
« on: November 11, 2010, 01:28:58 pm »
It sorta looks like an oversized cellphone.
Pages: 1 ... 96 97 [98] 99 100 ... 126
|