The seeds of the NIST elliptic curves (P-256, P-386, etc.) were selected by the NSA and are rumored to be like
SHA-1("Jerry and Alice deserve a raise. 1398")
However, Jerry Solinas, who picked them, forgot them and then passed away this year.
We should crack them!
I'm announcing a $8,192 bounty (tripled if donated to charity) for anyone cracking these hashes and solving this mystery.
nostr:npub1u2r7emsv6a23ammcnns4vgplj6qqygd5hysgfc7f3zrnmr88tu2qmekfqs Honest question, what was the alternative actionable recommendation for a non-technical at-risk user? "The latest Google Pixel is most secure as long as it's getting updates"? Or you think "Android is most secure" would have been better even if it resulted in a random Samsung from the corner store?
nostr:npub1gcl7nsg5gjejquna9kv3j4kzujhgpakkmmt9ful3772rw4s0xzxqqlcs78 we’re fixing it!! Go 1.21 has opt-in new semantics and if all goes well Go 1.22 will have them by default.
I'm not an LLM power user, but I just realized I can use them to figure out all the times I said "that's unfortunate" or "that would be a good v2 change" on the Go issue tracker in the last 6 years and I am so excited.
nostr:npub17qejctd76jm8syfmpkde4nlur4avy2fhthwk75yce2ykes08zqjs3gv7la why not use a scriptmanager of your choice and write the <30 lines of js for this?
nostr:npub1xa7jr5wl773mwvuduve29zj8n53vfgcqlulaq0mma85xr75hwv9svzy7yc Then I'd have to give the scriptmanager access to the github.com origin. I am waiting for uBO Lite to land on the Firefox store to drop the last global permissioned extension.
My kingdom for a GitHub setting to disable "hidden items".
Aaaalmost tempted to install an extension for this, but I am not giving anything Javascript execution permissions under the github.com origin.

