- Bad keyboard (keys either not registering presses, or registering too many. Particularly annoying when it's the command key that is not working, making copy/paste operations difficult)
- Bad trackpad (phantom mouse movements, unintended scrolling or navigation)
- Crackling audio
- Subdued audio (as though underwater)
- Screen brightness low on unlock (even after disabling auto brightness)
- Screen desaturated after unlock
- Plays random loud sound when plugging into power source (audio volume is ZERO)
- Cursor haphazardly just isn't fucking there, and typing does nothing
- Unlock screen slow after boot (FileVault is enabled, two accounts)
- Random crashes after sleep
<?php | |
namespace Tests\ArikCrypto; | |
use BitcoinPHP\BitcoinECDSA\BitcoinECDSA; | |
class ECCTest extends \PHPUnit_Framework_TestCase { | |
public function testDiffieHellman() { |
const BigInteger = require('bigi'); | |
const _ = require('lodash'); | |
const prova = require('prova-lib'); | |
const crypto = require('crypto'); | |
const bitcoin = require('bitgo-utxo-lib'); | |
const ecurve = require('ecurve'); | |
let secp256k1 = ecurve.getCurveByName('secp256k1'); |
const BigInteger = require('bigi'); | |
const _ = require('lodash'); | |
const prova = require('prova-lib'); | |
const crypto = require('crypto'); | |
const ecurve = require('ecurve'); | |
let secp256k1 = ecurve.getCurveByName('secp256k1'); | |
/** |
const ecurve = require('ecurve'); | |
let secp256k1 = ecurve.getCurveByName('secp256k1'); | |
const BigInteger = require('bigi'); | |
const crypto = require('crypto'); | |
const calculateHash = (R, P, message) => { | |
const hashPreimage = Buffer.concat([R.getEncoded(true), P.getEncoded(true), Buffer.from(message, 'utf-8')]); | |
return BigInteger.fromHex(crypto.createHash('sha256').update(hashPreimage).digest('hex')).mod(secp256k1.n); | |
}; |
""" | |
This script will search 4chan (need to specify a board unfortunately) and then | |
search all comments on Reddit for specific keywords. If found, it will then send | |
an email with the links to any matching posts. | |
Because 4chan posts are archived after ~48 hours I would recommend setting this up | |
to run on that cadence as well. | |
Sender email will need "Allow less secure apps" to ON or similar setting. | |
I followed these instructions for setting that up: |
This document seeks to outline a broad set of requirements for crypto-asset custodians based on lessons learned from historical failures to understand and remove attack surface.
It will also assume that not everyone has equal resources or equal risk and as such four incrementally harder security levels to that effect, depending on
There might be a secure scheme that non-interactively generates a n-of-n
FROST key and from there you can interactively turn it into a t-of-n
by issuing new shares (i.e. enrolment).
I don't really know if this is a useful contribution even if it works. There might be some utility in not having multiple schemes but rather a one size fits all approach.
MuSig takes a "multiset" of n
public keys and outputs a single aggregated key which takes n-of-n
secret keys to sign.
Set z_i = H(X_1,.. X_i, .. X_n, X_i)
for i = 1,2, .. n
.