Skip to content

Instantly share code, notes, and snippets.

View FireyFly's full-sized avatar

FireFly FireyFly

View GitHub Profile
@0xabad1dea
0xabad1dea / dual-ec-but-biased.md
Created December 28, 2013 23:06
Dual EC, The Saga Continues: BUT MAYBE I'M BIASED

Dual EC, The Saga Continues: BUT MAYBE I’M BIASED

Bla bla bla this is my personal opinion bla bla bla.

Patents. Can’t live with violating them, can’t live without violating them. The entire concept of patented cryptography is a bit beyond what I have the energy to deal with right now. Whatever. We’re going in.

It didn’t click with me yesterday, reading the crypto news, that I had already quoted one Dan Brown with whom we are now concerned. No, not the one who wrote the novels. One of the other ones. I cited him in my timeline of trying to reconstruct where and when exactly Dual EC DRBG went so wrong. Specifically, the paper has a casual mention (bottom of page 7) that the proof of security relies on initialization value Q being random, because if it is not random, an adversary in-the-know can recover the prestates and everything’s downhill from there. Therefore – and I quote – it is generally preferable for Q to be c

@eligrey
eligrey / leaks.md
Last active November 22, 2023 23:14
Entities that have sold or leaked my personal data

Eli's leak list

The following entities have either sold or leaked personal data about me, including email addresses and phone numbers. Be wary of sharing your data with them.

Email addresses

These entities have either sold or leaked specific unique email addresses of mine to unauthorized parties, such as spammers.

@tangrs
tangrs / bin2elf.sh
Last active January 14, 2025 20:03
Convert a memory dump/raw binary image into an ELF file
#!/bin/sh
# Convert a raw binary image into an ELF file suitable for loading into a disassembler
cat > raw$$.ld <<EOF
SECTIONS
{
EOF
echo " . = $3;" >> raw$$.ld
@daeken
daeken / security.md
Created August 16, 2012 03:05
Outline
  • Intro
    • Mindset
      • Break all the things
    • Understanding is key
      • Security people are the most diverse in tech for that reason
  • Web security
    • Tools
      • Burp
    • XSS
    • CSRF
@judofyr
judofyr / display.dasm
Created April 12, 2012 13:05
more assembly from 0x10c leak
; Printing stuff to the screen
; by Markus Persson
#macro clear(color) {
push(a)
set a, color
shl a, 8
bor a, 0x20
mem_fill(0x8000, 0x180, a)
set [screen_p], 0
@rmmh
rmmh / A.mdown
Created April 9, 2012 04:36
DPCU-16 Spec Suggestions

DCPU-16 Spec Suggestions

  1. Evaluate b before a

This makes instructions that address the stack twice meaningful instead of confusing and useless.

ADD PEEK, POP should pop the top of the stack and add it to the second entry, but currently the PEEK is evaluated before the POP occurs.

  1. Add [SP+next word] addressing
@Gozala
Gozala / example.js
Created January 29, 2012 03:46
Workaround for lack of "tail call optimization" in JS
// Lack of tail call optimization in JS
var sum = function(x, y) {
return y > 0 ? sum(x + 1, y - 1) :
y < 0 ? sum(x - 1, y + 1) :
x
}
sum(20, 100000) // => RangeError: Maximum call stack size exceeded
// Using workaround
@robotlolita
robotlolita / api.doll
Created December 13, 2011 02:10
Collection API -- 4th attempt
Module collection
Interface Iterator<C<E>>
next :: (E, C<E> -> Ignored Any) -> Promise
exhausted_p :: () -> Bool
Interface Traversable<C<E>>
each :: C<E>, (E, C<E> -> Ignored Any) -> Undefined
Interface Building<C<E>>
add :: C<E>, value:E -> C<E>
@dherman
dherman / monocle-mustache-semi.js
Created December 1, 2011 08:24
Monocle-mustache using semicolons (intuition: blocks and statements, not object literals)
// inspired by https://github.com/raganwald/homoiconic/blob/master/2011/11/sans-titre.md#readme
// and by https://groups.google.com/a/dartlang.org/group/misc/browse_thread/thread/611c04100ac17142
// traditional method chaining with combinators:
console.log(range(1, 3)
.concat(range(4, 6))
.map(function(x) { return x * x })
.filter(function(x) { return x % 2 === 0 })
.reverse());
@robotlolita
robotlolita / core.harm
Created November 2, 2011 18:58
Harmonia's silly example
### core.harm --- Harmonia's core library
#
# This module provides the core functions from Harmonia implemented in
# Harmonia itself.
# Booleans are just plain functions, receiving two function bodies and
# calling the appropriate one.
let true [a {}, b {}] {
call a
};