News:

Come Chat with us live! Learn how HERE!

Main Menu

Rcon Utility

Started by Foe of Eternity, March 25, 2011, 03:40:54 AM

Tremulant

Quote from: F50 on April 01, 2011, 04:00:03 PM
Quote from: Tremulant on March 31, 2011, 03:46:33 PMyour reversible password encryption method is secret, if it weren't secret it'd be really easy to reverse the encryption on saved passwords.
The main problem being, its in the assembler, the method is not secret.
It's secret, relatively speaking. Have you actually reverse engineered the thing at this point?

So, in short, Foe of eternity is relying on the fact that the source for his encryption isn't available for security and f50 is easily confused and a sometimes louder than he is bright. We're all a bunch of bloody idiots and this topic is going nowhere, lock?
Quote from: Firstinaction on April 07, 2011, 03:36:46 AM
my knees by my face and my ass is being hammered

F50

I'll admit it is relatively secret, but, as foe of eternity has pointed out, so is one's own machine. It is not secret in the cryptographical sense, as far as I understand it.

Quote
on the note of source...
do we have to discuss this over again?
you'll find the source is already posted
The source is not posted, it does not compile. Anyways its official, none of us can hear each other speak.  ::)

Quoteonce again with the not reading: i never said the rijndael cypher was the security, and the cypher is only for me (and to add a little privacy)
i even quoted what i said the security was and you STILL can't figure it out?
What is security but privacy of communication and storage of data? The thing that I still cannot figure out is how this adds any privacy beyond the systems protecting your own machine. If someone is skilled enough to handle that task, I would expect that person to be skilled enough to not be particularly challenged by this. However, it seems so close to a potentially working system, a system capable enough that it would not need to be obscured by a binary. But nevermind, there is no true communication here.

Quoteand on the note of AES not being proprietary, when did i say it was? i said the algorithm i use to generate the password is proprietary

Alas, it seems we are incapable of communicating the most basic ideas between each other. A bunch of bloody idiots we are indeed. I did not say that you said that AES was proprietary (ok, that sounds scarily circular). What I meant to say is that the means of generating the password, lets call it the "key" to distinguish from the rcon password, is...rather completely useless, when it seems that one could implement proper key generation . Also, if you re-read this thread (admittedly, a terrible exercise), there are at least three meanings we have put to the word "password"...
"Any sufficiently advanced stupidity is indistinguishable from malice." -- Grey's Law


Foe of Eternity

on the note of the source code, you have enough information to recreate the source even if it's not fully posted

and i agree with tremulant this should probably be locked

Quote from: player1 on February 17, 2008, 06:50:45 PM
No. Let n00bs pick overly destructive Human weapons and then use them in their own base and around their own teammates. Maybe then they'll learn that doing that is a stupid idea. Meanwhile, I will be slashing at their damaged Armoury, after I vault their smoking turrets and the scattered bodies of their TK' d teammates. N00bs: they're what's for breakfast.

vcxzet

I love closed source utilities for open source applications.

Foe of Eternity


Quote from: player1 on February 17, 2008, 06:50:45 PM
No. Let n00bs pick overly destructive Human weapons and then use them in their own base and around their own teammates. Maybe then they'll learn that doing that is a stupid idea. Meanwhile, I will be slashing at their damaged Armoury, after I vault their smoking turrets and the scattered bodies of their TK' d teammates. N00bs: they're what's for breakfast.