Lock Picking 101 Forum
A community dedicated to the fun and ethical hobby of lock picking.
       

Lock Picking 101 Home
Login
Profile
Members
Forum Rules
Frequent Forum Questions
SEARCH
View New Posts
View Active Topics


Live Chat on Discord
LP101 Forum Chat
Keypicking Forum Chat
Reddit r/lockpicking Chat



Learn How to Pick Locks
FAQs & General Questions
Got Beginner Questions?
Pick-Fu [Intermediate Level]


Ask a Locksmith
This Old Lock
This Old Safe
What Lock Should I Buy?



Hardware
Locks
Lock Patents
Lock Picks
Lock Bumping
Lock Impressioning
Lock Pick Guns, Snappers
European Locks & Picks
The Machine Shop
The Open Source Lock
Handcuffs


Member Spotlight
Member Introductions
Member Lock Collections
Member Social Media


Off Topic
General Chatter
Other Puzzles


Locksmith Business Info
Training & Licensing
Running a Business
Keyways & Key Blanks
Key Machines
Master Keyed Systems
Closers and Crash Bars
Life Safety Compliance
Electronic Locks & Access
Locksmith Supplies
Locksmith Lounge


Buy Sell Trade
Buy - Sell - Trade
It came from Ebay!


Advanced Topics
Membership Information
Special Access Required:
High Security Locks
Vending Locks
Advanced Lock Pick Tools
Bypass Techniques
Safes & Safe Locks
Automotive Entry & Tools
Advanced Buy/Sell/Trade


Locksport Groups
Locksport Local
Chapter President's Office
Locksport Board Room
 

Who is watching us?

Having read the FAQ's you are still unfulfilled and seek more enlightenment, so post your general lock picking questions here.
Forum rules
Do not post safe related questions in this sub forum! Post them in This Old Safe

The sub forum you are currently in is for asking Beginner Hobby Lock Picking questions only.

Postby Chrispy » 25 Sep 2005 4:53

chopitup: Good luck. :)

devildog: Not everyone cheats like you do. :roll:

:P
Image
Some things may be pick proof, but everything can be bypassed....
Chrispy
 
Posts: 3569
Joined: 24 Mar 2005 15:49
Location: GC, QLD

Postby skold » 25 Sep 2005 4:54

Yeah next time you use wikipedia use auto summarise on msword to make yourself look smarter.
Image
skold
 
Posts: 2250
Joined: 24 Feb 2004 3:59
Location: Australia

Postby chopitup » 25 Sep 2005 4:55

I never said I didn't use Wikipedia. I'm good at gathering information. ;) A good portion I know off the top of my head, but the details of DEVGRU I admit to looking up.
chopitup
 
Posts: 151
Joined: 15 Mar 2005 22:52
Location: USA

Postby devildog » 25 Sep 2005 4:58

devildog: Not everyone cheats like you do.


What's that supposed to mean?

You know, I WAS going to mention something about you earlier when the subject of sheep came up, but I held back... :lol:
"I think people should be free to engage in any sexual practices they choose; they should draw the line at goats though."

Elton John
devildog
Supporter
Supporter
 
Posts: 1719
Joined: 3 Jul 2005 1:14
Location: Texas

Postby skold » 25 Sep 2005 5:01

devildog wrote:
devildog: Not everyone cheats like you do.


What's that supposed to mean?

You know, I WAS going to mention something about you earlier when the subject of sheep came up, but I held back... :lol:


wtf? silly man
Image
skold
 
Posts: 2250
Joined: 24 Feb 2004 3:59
Location: Australia

Postby Chrispy » 25 Sep 2005 5:03

The emoticon indicated the fact that it was a joke.

This one: :arrow: :P

Mmmkay?
Image
Some things may be pick proof, but everything can be bypassed....
Chrispy
 
Posts: 3569
Joined: 24 Mar 2005 15:49
Location: GC, QLD

Postby skold » 25 Sep 2005 5:07

Pfft...why would i take time to look at silly yellow things pulling faces ??
Image
skold
 
Posts: 2250
Joined: 24 Feb 2004 3:59
Location: Australia

Postby Chrispy » 25 Sep 2005 5:09

That was for devildog, not you skold.
Image
Some things may be pick proof, but everything can be bypassed....
Chrispy
 
Posts: 3569
Joined: 24 Mar 2005 15:49
Location: GC, QLD

Postby skold » 25 Sep 2005 5:12

Fairnuff..

Lazy and angryness makes skold a puppy dog.

:?

My phone is dead due to the rain...BAH
Image
skold
 
Posts: 2250
Joined: 24 Feb 2004 3:59
Location: Australia

Postby devildog » 25 Sep 2005 8:08

Oh! No, I knew you were just joking Chrispy, I wasn't offended or anything, I just didn't get it.

You know the easiest, and probably most effective, way, by far, to use to determine if someone plagarized or not? Highlight and copy a few sentences from the work in random places and run them through Google. The really funny thing is that I remember reading about, when I was in highschool and later in college, all the different complicated and expensive software programs that teachers were trying to use to catch people plagarizing stuff from God-knows-where thanks to the net. It's totally impractical, and downright laughable, of course, because almost all of these programs depended on their company's own database to search through for matching text that the company inevitably marketed as being so enormous and well-rounded with all possible academic subjects covered with all the important and obvious works and most of the obscure ones, too. This is just funny, because all you have to do is ask, which database is bigger and by how much, ____ company's or friggin' GOOGLE??! And lycos, etc. If I'm going to copy/paste stuff into a paper, first of all I'm going to use the most obscure source I possibly can, and secondly I'm going to switch the wording up. Of course, I haven't done anything like this in a couple of years, so maybe they have things that MIGHT catch that, but I kinda doubt it...
"I think people should be free to engage in any sexual practices they choose; they should draw the line at goats though."

Elton John
devildog
Supporter
Supporter
 
Posts: 1719
Joined: 3 Jul 2005 1:14
Location: Texas

Postby hzatorsk » 25 Sep 2005 9:07

SFGOON wrote:Let's make that a bit more fair. Encryption is based off of a number that is a prime times a prime. It makes a unique number that is very hard to break down or "factor out." i.e. 21 = 7 x 3 and nothing else in the universe can create the number 21.


Generally true... if applied to the current practices in asymetrical encryption (ignoring elliptical curves for the moment). The field of encryption also includes various symetrical algorithms that are not based upon primes at all.

SFGOON wrote: If you had an eight digit prime times a fifteen digit prime, factoring it out would be extremely difficult, but once that has been achieved, the entire code is ruined.


Actually, this example is quite easy to factor as all the primes are known in this range. Since roughly one third of the numbers of a given range are primes... this space (1 to 15 digit numbers) can be exhaustively searched in a few minutes.

SFGOON wrote:NSA scientists are currently applying 11-dimensional "Membrane or M-theory" mathmatics (google it!) to break down these numbers using imaginary primes. (An "I" or Imaginary number has been used in math for many years, such as the square root of -2, which can't exist, yet has many applications in electrical engineering.) Using the algorythms extracted form the 11 dimensional universe (as opposed to 3D,) makes computing even the most enormous primes a trivial matter.


Perhaps... but it has not been demonstrated to resolve a real number prime.

SFGOON wrote: Compare it to picking a normal lock to one that's cut away - encryption is nothing more than "security through obscurity" using prime numbers - and it won't last...


I respectfully disagree... Obscure, Yes! But not in the sense that this phrase is used. Most that use the term "security through obscurity" mean to imply a trivial secret. (ie: renaming password.xls to amort.xls to hide it openly).

It's my position that there are two methods of brute force attack. Exhaustive search and reduction.

Exhaustively: As long as the keyspace grows significantly larger than the capabilities of a distributed network of systems attempting to search it, there are no known exhaustive methods to 'guarantee' a reversal.

Reduction: No theory of reducing the prime space into simpler terms has been found and dimensional theories complicate (read as bigger computers) and not simplify the notations. (faster solution)

So... how is it broken today??? The known attacks against asymetrical encryption has absolutely nothing to do with the primes it is built upon. But more so with the methods of comprimising them. Google for: FBI Magic Lantern Keylogger

That's how the big boys do it. They cheat!
hzatorsk
 
Posts: 696
Joined: 20 Jul 2004 11:15

free

Postby sivlogkart » 25 Sep 2005 10:08

Some very impressionistic mathematical thoughts flying around here!

KJ
sivlogkart
 
Posts: 298
Joined: 10 Sep 2005 1:43

Postby bedheadben » 25 Sep 2005 12:19

sure are
bedheadben
 
Posts: 55
Joined: 25 Sep 2005 4:28
Location: Los Angeles, CA, U.S.A.

security

Postby sivlogkart » 25 Sep 2005 12:30

All security is the same, in that you attack it by focusing on the weakest part. Also if your computer does not have physical security that is were I would start.

KJ
sivlogkart
 
Posts: 298
Joined: 10 Sep 2005 1:43

Postby SFGOON » 25 Sep 2005 13:03

hzatorsk - that was a joke, I'm funny.... :P
"Reverse the obvious and the truth will present itself." - Carl Jung
SFGOON
Admin Emeritus
 
Posts: 2160
Joined: 9 Sep 2004 14:04
Location: Puget Sound, WA

PreviousNext

Return to Got Questions? - Ask Beginner Hobby Lockpicking Questions Here

Who is online

Users browsing this forum: No registered users and 9 guests