Sunday, October 8, 2017

wow! let me try to say it!!! did u find out, that the ellipt curve is insert on a specific hardware, that means that, the 3 lines of the triangle inside the hexagon, inside the circle, reach each point on different frequencies...hum...therefore you need to build this :

In cryptography, Curve25519 is an elliptic curve offering 128 bits of security and designed for use with the elliptic curve Diffie–Hellman (ECDH) key agreement scheme. It is one of the fastest ECC curves and is not covered by any known patents.[1] The reference implementation is public domain software.[2]
The original Curve25519 paper defined it as a Diffie–Hellman (DH) function. Daniel J. Bernstein has since proposed that the name Curve25519 be used for the underlying curve, and the name X25519 for the DH function.[3]


LIKE THIS :


Curve25519 for ARM Cortex-M0

The software described below is a standalone Curve25519 implementation optimized for speed.

Build instructions

Installing llvm, clang, and st-link

To install llvm/clang and an ARM gcc cross-compiler on a Debian system, run the following commands (as root):
apt-get install llvm clang gcc-arm-none-eabi
Also, you will probably have to install libc6-dev-i386:
apt-get install libc6-dev-i386
To program the Cortex-M0 chip on the development board we need st-link. To download and build this tool, first install the libusb headers (as root):
apt-get install libusb-1.0-0-dev
run the following commands:
git clone https://github.com/texane/stlink.git
cd stlink
./autogen.sh
./configure
make && make install

Connecting the STM32F0Discovery development board

For our tests and benchmark we use the STM32F0Discovery development board. To read serial output from this board you will need a USB-TTL converter, which needs to be connected as follows:
  • 3.3V → 3.3V
  • TXD → PA3
  • RXD → PA2
  • GND → GND
  • 5V → DO NOT CONNECT
The setup should look like in the following picture:

Picture of a connected STM32F0Discovery Board

Building Curve25519 for ARM Cortex-M0

To download and build the software for ARM Cortex-M0, run the following commands:
wget http://munacl.cryptojedi.org/data/curve25519-cortexm0-20150813.tar.bz2
tar xjvf curve25519-cortexm0-20150813.tar.bz2
cd curve25519-cortexm0-20150813
make
Copyright warning: The software package contains a subdirectory named stm32f0xx which contains software copyrighted by ARM Ltd. The files in this subdirectory are thus not in the public domain.

Running tests and benchmarks

Each of the two versions of the software comes with 3 testing and benchmarking routines:
  • test/test_stm32f0.sh
  • test/speed_stm32f0.sh
  • test/stack_stm32f0.sh
Each of those scripts will program the Cortex-M0 on the STM32F0Discovery board (see above) and print the output through USB-serial (also see above) to standard out. Note that test_stm32f0.sh does not print anything if the test is successful.

Ok, to answer you, if I have a brilliant idea, about an animation decrypter for the ellipt curve, in corel...just follow the white rabbit of this math law "If the successive sides of a cyclic hexagon are a, b, c, d, e, f, then the three main diagonals concur at a single point if and only if ace = bdf"


If you want a math quiz : A hexagon with consecutive sides of lengths 2, 2, 7, 7, 11, and 11 is inscribed in a circle.  Find the radius of the circle.

http://www.qbyte.org/puzzles/p063s.html

Trigonometric Solution

Three chords of lengths 2, 7, and 11, inscribed in a semicircle of radius r. The angle subtended at the center of the circle by each chord is, respectively, 2a, 2b, 2c. Angle d is complementary to c, so that d is the angle between a radius and the chord of length 11.
We can drop a perpendicular from the center of the circle to each of the chords, bisecting the isosceles triangles, as shown.
We have a + b + c = pi/2, and c + d = pi/2.
Hence a + b = d < pi/2.
We also have
a = arcsin(1/r), b = arcsin(7/2r), d = arccos(11/2r)
Taking the cosine of both sides of a + b = d, and using trigonometric identities cos(x + y) = cosx cosy − sinx siny, and sin2x + cos2x = 1, we get
sqrt(1 - 1/r^2) * sqrt(1 - 49/4r^2) - 7/2r^2 = 11/2r
Adding 7/2r2 to both sides of the equation, squaring, and multiplying by 2r3, we obtain
2r3 − 87r − 77 = 0
This easily factorizes, giving (r − 7)(2r2 + 14r + 11) = 0.
The quadratic factor has negative real roots.  Hence r = 7 is the only positive real root.
Therefore the radius of the circumscribing circle of the original hexagon is 7 units.

Elsa David hey...i think is even more complicated math problem than the ellipt curve it self




and finally I just got the latest attack network App, that overcomes the SSL and you do this with a cable and an App, ...that also runs on mobile...so...let the tribe think about this (and you al..) just think about it...

check this one out gang! We have hacked their network key, because we are inside the facility...so...we will transfer data, and get the memorized codes

So, where are the codes of the 6 digit banking alarms access kept on the memory controller, or what are the files we are looking for ?

Encryption Analyzer
Encryption Analyzer
Find all the password-protected or encrypted files on a PC or over the network.
This product is not a stock item. Please allow extra time for processing your order. If you need expedited delivery, please call us for service options.
Digital Intelligence Price
SKU: S6610
$295.00
Key Features
  • Scans files fast - over 4,000 files per minute on an average PC.
  • Supports over 160 different file types.
  • Lists recovery options and launches appropriate password recovery modules if necessary.
  • Provides detailed information: file formats, protection methods.
  • User-friendly Explorer-like interface.
  • Available as SDK for .NET.

I was not satisfied, with the reading memory of the alarm electronics...so I'm starting here, with this forensic police list..

Nokia

*#06#                IMEI
*#0000#            view Software Version
*#746025625#    [*#sim0clock#]
*#92702689#      [*#war0anty#]   secret menu:
 1. Displays Serial Number
 2. Displays the Month and Year of Manufacture (0997)
 3. Displays (if there) the date where the phone was purchased
 4. Displays the date of last repairment – if found (0000)
 5. Makes you capebel of transferring user data
 6. Shows how many hours the phone has been on

*3370#      Enhanced Full Rate Codec (EFR) activation
#3370#     Enhanced Full Rate Codec (EFR) deactivation
*4370#      Half Rate Codec activation
#4370#     Half Rate Codec deactivation
xx# – xx position in Phone Book

Good morning everybody!!! welcome back to war! So let's go back, to saturday morning, and fuck camarada Isabel dos Santos, the real communist Newton bilionaire, with her internet provider compnay, and give her a lost of 112 million euros a year with my unique modem! "Change the MAC Address for a Virtual Machine"

You can use advanced virtual network adapter settings to assign a new MAC address to a virtual machine.


Note
You cannot configure advanced virtual network adapter settings for a shared or remote virtual machine.

1

Select the virtual machine and select VM > Settings.
2

On the Hardware tab, select the virtual network adapter and click Advanced.
3

Type a new MAC address in the MAC Address text box, or click Generate to have Workstation generate a new address.
4


Click OK to save your changes.


 forget bridge adapters NSA - National Security Agency


and for more a couple of euros, you will get this perfectly set 

Socks 5 proxy list

For those familiar with using SOCKS proxies, you might want to know what makes SOCKS4 different from SOCKS5. In a nutshell, version 5 of the protocol is more advanced. Here is a list of features that only apply to ver. 5:
- Authentication
- Support for UDP Proxy
- DNS requests can be sent through the proxy
Which version you use depends on the configuration of the server you're connecting to. It will either support 4, 5 or both. SOCKS4a is an extension that fixes a common name resolution problem

https://sockslist.net/list/proxy-socks-5-list/

Cielo e terra (duet with Dante Thomas)