• Hijacked?

    From Chris M. Thomasson@chris.m.thomasson.1@gmail.com to sci.crypt on Thu Nov 13 03:02:53 2025
    From Newsgroup: sci.crypt

    This cloudflare crap in my code that I did not write seems scary:

    They inject it on the fly?

    view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    WTF!?!?

    <script defer src="https://static.cloudflareinsights.com/beacon.min.js/vcd15cbe7772f49c399c6a5babf22c1241717689176015"
    integrity="sha512-ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ=="
    data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}'
    crossorigin="anonymous"></script>
    </body>
    </html>


    I only use them for HTTPS. Those little shits!

    Here is my test page for my test cipher:

    https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    Fucking cloudflare!

    But, that script can record plaintext before its encrypted?
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Chris M. Thomasson@chris.m.thomasson.1@gmail.com to sci.crypt on Thu Nov 13 03:12:07 2025
    From Newsgroup: sci.crypt

    On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
    This cloudflare crap in my code that I did not write seems scary:

    They inject it on the fly?

    view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    WTF!?!?

    <script defer src="https://static.cloudflareinsights.com/beacon.min.js/ vcd15cbe7772f49c399c6a5babf22c1241717689176015" integrity="sha512- ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ==" data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}' crossorigin="anonymous"></script>
    </body>
    </html>


    I only use them for HTTPS. Those little shits!

    Here is my test page for my test cipher:

    https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    Fucking cloudflare!

    But, that script can record plaintext before its encrypted?

    If that injected script, Eve can see the secret key, then my experiment
    is broken by default?
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Chris M. Thomasson@chris.m.thomasson.1@gmail.com to sci.crypt on Thu Nov 13 03:20:47 2025
    From Newsgroup: sci.crypt

    On 11/13/2025 3:12 AM, Chris M. Thomasson wrote:
    On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
    This cloudflare crap in my code that I did not write seems scary:

    They inject it on the fly?

    view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    WTF!?!?

    <script defer src="https://static.cloudflareinsights.com/
    beacon.min.js/ vcd15cbe7772f49c399c6a5babf22c1241717689176015"
    integrity="sha512-
    ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ==" data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}' crossorigin="anonymous"></script>
    </body>
    </html>


    I only use them for HTTPS. Those little shits!

    Here is my test page for my test cipher:

    https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    Fucking cloudflare!

    But, that script can record plaintext before its encrypted?

    If that injected script, Eve can see the secret key, then my experiment
    is broken by default?

    those Cloudflare bastards! How many other sites got injected against
    their will?
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Chris M. Thomasson@chris.m.thomasson.1@gmail.com to sci.crypt on Thu Nov 13 03:26:19 2025
    From Newsgroup: sci.crypt

    On 11/13/2025 3:20 AM, Chris M. Thomasson wrote:
    On 11/13/2025 3:12 AM, Chris M. Thomasson wrote:
    On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
    This cloudflare crap in my code that I did not write seems scary:

    They inject it on the fly?

    view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    WTF!?!?

    <script defer src="https://static.cloudflareinsights.com/
    beacon.min.js/ vcd15cbe7772f49c399c6a5babf22c1241717689176015"
    integrity="sha512-
    ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ==" data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}' crossorigin="anonymous"></script>
    </body>
    </html>


    I only use them for HTTPS. Those little shits!

    Here is my test page for my test cipher:

    https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    Fucking cloudflare!

    But, that script can record plaintext before its encrypted?

    If that injected script, Eve can see the secret key, then my
    experiment is broken by default?

    those Cloudflare bastards! How many other sites got injected against
    their will?

    Injecting my code via proxy for my experimental cipher! https://youtu.be/HEYrRNMr2kg?list=RDHEYrRNMr2kg
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Radio Eriwan@bounce.me@radio-eriwan.ru to sci.crypt on Thu Nov 13 15:18:25 2025
    From Newsgroup: sci.crypt

    Chris M. Thomasson wrote:
    On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
    This cloudflare crap in my code that I did not write seems scary:

    They inject it on the fly?

    view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    WTF!?!?

    <script defer src="https://static.cloudflareinsights.com/beacon.min.js/ vcd15cbe7772f49c399c6a5babf22c1241717689176015" integrity="sha512- ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ=="
    data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}'
    crossorigin="anonymous"></script>
    </body>
    </html>


    I only use them for HTTPS. Those little shits!

    Here is my test page for my test cipher:

    https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    Fucking cloudflare!

    But, that script can record plaintext before its encrypted?

    If that injected script, Eve can see the secret key, then my experiment
    is broken by default?

    No problem, because nobody is using your cipher for serious tasks. Efye


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Chris M. Thomasson@chris.m.thomasson.1@gmail.com to sci.crypt on Thu Nov 13 07:08:59 2025
    From Newsgroup: sci.crypt

    On 11/13/2025 4:18 AM, Radio Eriwan wrote:
    Chris M. Thomasson wrote:
    On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
    This cloudflare crap in my code that I did not write seems scary:

    They inject it on the fly?

    view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    WTF!?!?

    <script defer src="https://static.cloudflareinsights.com/beacon.min.js/
    vcd15cbe7772f49c399c6a5babf22c1241717689176015" integrity="sha512-
    ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ=="
    data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}'
    crossorigin="anonymous"></script>
    </body>
    </html>


    I only use them for HTTPS. Those little shits!

    Here is my test page for my test cipher:

    https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    Fucking cloudflare!

    But, that script can record plaintext before its encrypted?

    If that injected script, Eve can see the secret key, then my experiment
    is broken by default?

    No problem, because nobody is using your cipher for serious tasks. Efye



    good!
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Chris M. Thomasson@chris.m.thomasson.1@gmail.com to sci.crypt on Thu Nov 13 07:11:20 2025
    From Newsgroup: sci.crypt

    On 11/13/2025 4:18 AM, Radio Eriwan wrote:
    Chris M. Thomasson wrote:
    On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
    This cloudflare crap in my code that I did not write seems scary:

    They inject it on the fly?

    view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    WTF!?!?

    <script defer src="https://static.cloudflareinsights.com/beacon.min.js/
    vcd15cbe7772f49c399c6a5babf22c1241717689176015" integrity="sha512-
    ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ=="
    data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}'
    crossorigin="anonymous"></script>
    </body>
    </html>


    I only use them for HTTPS. Those little shits!

    Here is my test page for my test cipher:

    https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    Fucking cloudflare!

    But, that script can record plaintext before its encrypted?

    If that injected script, Eve can see the secret key, then my experiment
    is broken by default?

    No problem, because nobody is using your cipher for serious tasks. Efye



    My online violates my rules anyway. I need it to use a TRNG! Its a good symmetric cipher.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Chris M. Thomasson@chris.m.thomasson.1@gmail.com to sci.crypt on Thu Nov 13 07:12:29 2025
    From Newsgroup: sci.crypt

    On 11/13/2025 7:11 AM, Chris M. Thomasson wrote:
    On 11/13/2025 4:18 AM, Radio Eriwan wrote:
    Chris M. Thomasson wrote:
    On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
    This cloudflare crap in my code that I did not write seems scary:

    They inject it on the fly?

    view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    WTF!?!?

    <script defer src="https://static.cloudflareinsights.com/beacon.min.js/ >>>> vcd15cbe7772f49c399c6a5babf22c1241717689176015" integrity="sha512-
    ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ=="
    data-cf-
    beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}'
    crossorigin="anonymous"></script>
    </body>
    </html>


    I only use them for HTTPS. Those little shits!

    Here is my test page for my test cipher:

    https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    Fucking cloudflare!

    But, that script can record plaintext before its encrypted?

    If that injected script, Eve can see the secret key, then my experiment
    is broken by default?

    No problem, because nobody is using your cipher for serious tasks. Efye



    My online violates my rules anyway. I need it to use a TRNG! Its a good symmetric cipher.

    http://funwithfractals.atspace.cc/ct_cipher/

    Experimental HMAC Cipher
    By: Chris M. Thomasson
    Pre-Alpha Version (0.0.0)

    Prerequisites
    This document assumes the reader is familar with how HMAC works.

    Now, keep in mind that my algorithm relies on a quirky implementation
    detail that does not alter the internal state when we take a digest. In
    other words, my code needs the ability to take a digest without
    destroying its internal state: This is not a traditional HMAC!

    In order to get my algorithm working, an HMAC can copy its internal
    state, then perform the digest operation on said copy. So, to clear
    up... Taking a digest should not mutate the state of the HMAC. This is
    how the quirky Python HMAC implementation works, and unfortunately my algorithm uses that.

    1. Introduction
    The cipher uses propagation of HMAC digest bytes to achieve a radical diffusion of a plaintext within its ciphertext, and vise versa. It has
    the following basic properties:

    1: Every encryption of the same plaintext creates a radically different ciphertext.

    2: If a single bit of a ciphertext is altered, it decrypts into a
    radically different plaintext.

    2. The Secret Key
    Both properties of my cipher rely on a good cryptographic hash function.
    HMAC is an abstract layer on top of a hash algorithm that allows for a
    secret key. Let us refer to this HMAC key as SK.hmac_key from now on. We
    also need to allow Alice and Bob to choose a hash to use with HMAC. Let
    us refer to this as SK.hash_algo. The size of HMAC's digest in bytes is
    based on the digest size of SK.hash_algo. For example, SHA-256 has
    32-byte digests.

    Another aspect involves prepending random bytes from a TRNG to the front
    of a plaintext. Let us refer to the number of these random bytes as
    SK.rand_n. Okay, the secret key SK used by Alice and Bob is comprised of: _________________________________
    SK.hmac_key = Key for HMAC.
    SK.hash_algo = The Hash Algorithm.
    SK.rand_n = The Number of TRNG bytes.
    _________________________________
    SK.hmac_key must be a cryptographically secure password, e.g. comprised
    of 1024 bytes from a TRNG.

    SK.hash_algo must be a cryptographically secure hash, e.g. SHA-384.

    SK.rand_n must be equal to, or ideally larger than the digest size of SK.hash_algo.

    3. Pseudo-Code
    Brief Description of the pseudo-code...

    3.1 The CRYPT_ROUND Function
    The CRYPT_ROUND function encrypts or decrypts a plaintext P. It takes
    two parameters P and M, where M is the mode of operation. It returns its
    final result as C which is either the decrypted or encrypted bytes wrt
    the value of M. In the pseudo-code for the CRYPT function:

    P = The plaintext or ciphertext bytes.
    M = ENCRYPT means encrypt P; DECRYPT means decrypt P.
    C = The return value based on M.

    C = CRYPT_ROUND(P, M):
    _________________________________
    1: Create an HMAC session H using SK.hmac_key for its key, and
    SK.hash_algo for its underlying hash algorithm.

    2: Update H with the bytes of SK.hmac_key in reverse order.

    3: Iterate through all the bytes in P:

    Set I_P is used as an index for P, set it to zero.

    WHILE (I_P is less than the size in bytes of P)
    {
    3.1: Obtain a raw hash digest D from H.

    3.2: Iterate through all the bytes in D.

    Set I_D is used as an index for D, set it to zero.

    WHILE (I_P is less than the size in bytes of P AND I_D is less than the
    size in bytes of D)
    {
    3.2.1: Set the byte C[I_P] to P[I_P] xor'ed with D[I_D].

    3.2.2: Follow the mode M, encrypt or decrypt:

    IF (M is equal to ENCRYPT)
    {
    3.2.2.1: Update H using the byte P[I_P].

    3.2.2.2: Update H using the byte C[I_P].

    }

    ELSE
    {
    3.2.2.3: Update H using the byte C[I_P].

    3.2.2.4: Update H using the byte P[I_P].

    }
    3.2.3: Increment I_D by one.

    3.2.4: Increment I_P by one.

    }
    }
    4. Return C to the caller.

    _________________________________

    3.2 The CRYPT Function
    The CRYPT function encrypts or decrypts a plaintext P. It takes two
    parameters P and M, where M is the mode of operation. It returns its
    final result as C which is either the decrypted or encrypted bytes wrt
    the value of M. In the pseudo-code for the CRYPT function:

    P = The plaintext or ciphertext bytes.
    M = ENCRYPT means encrypt P; DECRYPT means decrypt P.
    C = The return value based on M.

    C = CRYPT(P, M):
    _________________________________
    1: If the mode M is for encryption:

    IF (M is equal to ENCRYPT)
    {
    1.1: Create SK.rand_n number of bytes R from a TRNG.

    1.2: Prepend R to P.

    }
    2: Call CRYPT_ROUND(P, M) using P as the first parameter and M as the
    second parameter, and set its result to C.

    3: Set C_1 to the bytes of C in reverse order.

    4: Call CRYPT_ROUND(C_1, M) using C_1 as the first parameter and M as
    the second parameter, and set its result to C.

    5: If the mode M is for decryption:

    IF (M is equal to DECRYPT)
    {
    5.1: Remove SK.rand_n number of bytes from the front of C making it
    SK.rand_n bytes smaller.
    }
    6: Return C to the caller.

    _________________________________

    4. Description
    A description of the pseudo-code in section 3 on a step-by-step basis.

    4.1 The CRYPT_ROUND Function
    Steps CRYPT_ROUND.(1 and 2) Create a normal HMAC session called H using SK.hmac_key as its secret key _AND_ make it use SK.hash_algo as the
    underlying HMAC hash algorithm. Update H with the bytes of SK.hmac_key
    in reverse order. SK.hmac_key should be a crypto secure key, preferably
    larger than 1024 bytes of data generated from a TRNG. SK.hash_algo needs
    to be a crypto secure hash algorithm, perhaps SHA-384 with its 48-byte digests. Keep in mind that SK.rand_n needs to be at least as large as 48
    bytes in this case of the digest size reaped from SHA-384. SK.rand_n
    needs to be equal to, or preferably larger than the digest size of SK.hash_algo. Therefore, I recommend using a larger SK.rand_n, perhaps something like 79 in this case. These two steps create our HMAC
    "starting place" for either encryption or decryption depending on the
    mode M.

    4.2 The CRYPT Function
    Pending...

    5. Appendix
    This will show actual real implementations and various test vectors.

    Python Implementation
    Here is some example Python source code of the pseudo-code in section 3.


    # Chris M. Thomasson Copyright 2018 (c)
    # Experimental HMAC Cipher #____________________________________________________________


    # Our external libs #____________________________________________________________
    import random;
    import hashlib;
    import hmac;


    # Some Utilities
    #____________________________________________________________
    def ct_bytes_to_hex(origin, offset):
    hex = "";
    n = len(origin);
    t = "0123456789ABCDEF";
    for i in range(offset, n):
    c = ord(origin[i]);
    nibl = c & 0x0F;
    nibh = (c & 0xF0) >> 4;
    hex = hex + t[nibh];
    hex = hex + t[nibl];
    hex = hex + " ";
    if (not ((i + 1) % 16) and i != n - 1):
    hex = hex + "\r\n";
    return hex;


    # Generate n random bytes
    # These need should ideally be from a truly random, non-repeatable
    # source. TRNG!
    def ct_rand_bytes(n):
    rb = "";
    for i in range(n):
    rb = rb + chr(random.randint(0, 255));
    return rb;


    # The Secret Key
    # Contains all the parts of the secret key #____________________________________________________________
    class ct_secret_key:
    def __init__(self, hmac_key, hash_algo, rand_n):
    self.hmac_key = hmac_key;
    self.hash_algo = hash_algo;
    self.rand_n = rand_n;

    def __repr__(self):
    return "hmac_key:%s\nhash_algo:%s\nrand_n:%s" % (ct_bytes_to_hex(self.hmac_key, 0), self.hash_algo, self.rand_n);

    def __str__(self): return self.__repr__();


    # The Ciphertext or Plaintext
    # It holds the bytes of a ciphertext or a plaintext #____________________________________________________________
    class ct_bin:
    def __init__(self, ctxt):
    self.bytes = ctxt;
    def __repr__(self):
    return "%s" % (ct_bytes_to_hex(self.bytes, 0));

    def __str__(self): return self.__repr__();


    # The Crypt Round Function #____________________________________________________________
    def ct_crypt_round(SK, P, M):
    H = hmac.new(SK.hmac_key.encode(), None, SK.hash_algo);
    H.update(SK.hmac_key[::-1].encode());
    C = "";
    I_P = 0;
    I_P_N = len(P.bytes);
    while (I_P < I_P_N):
    D = H.digest();
    I_D = 0;
    I_D_N = len(D);
    while (I_P < I_P_N and I_D < I_D_N):
    C_I_P = ord(P.bytes[I_P]) ^ D[I_D];
    C = C + chr(C_I_P);
    if (M == False):
    H.update(P.bytes[I_P].encode());
    H.update(chr(C_I_P).encode());
    else:
    H.update(chr(C_I_P).encode());
    H.update(P.bytes[I_P].encode());
    I_P = I_P + 1;
    I_D = I_D + 1;
    return ct_bin(C);


    # The Crypt Function #____________________________________________________________
    def ct_crypt(SK, P, M):
    if (M == False):
    R = ct_rand_bytes(SK.rand_n);
    P.bytes = R + P.bytes;
    C = ct_crypt_round(SK, P, M);
    C_1 = ct_bin(C.bytes[::-1]);
    C = ct_crypt_round(SK, C_1, M);
    if (M == True):
    size = len(C.bytes) - SK.rand_n;
    C.bytes = C.bytes[SK.rand_n : SK.rand_n + size];
    return C;


    # The Main Program #____________________________________________________________

    # Alice and Bob's Secret Key
    #____________________
    SK = ct_secret_key(
    "This is the HMAC Key. It should be a crypto secure key! Damn it.",
    hashlib.sha384, # The hash function. It should be a crypto secure hash.
    73 # The number of bytes. The should be generated by a TRNG
    );
    print("%s" % (SK));

    # Alice's Plaintext
    #____________________
    Original_Plaintext = "ABCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDE";
    A_P = ct_bin(Original_Plaintext);
    print(
    "\n\nAlice's Plaintext Bytes:"
    "\n____________________\n%s\n" % (A_P)
    );

    # Encrypt
    #____________________
    C = ct_crypt(SK, A_P, False);
    print(
    "\n\nCiphertext Bytes:"
    "\n____________________\n%s\n" % (C)
    );

    # Decrypt
    #____________________
    B_P = ct_crypt(SK, C, True);
    print(
    "\n\nBob's Ciphertext Bytes:"
    "\n____________________\n%s\n" % (B_P)
    );


    if (B_P.bytes != Original_Plaintext):
    print("DATA CORRUPTED!");

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Rich@rich@example.invalid to sci.crypt on Sat Nov 15 02:24:57 2025
    From Newsgroup: sci.crypt

    Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:

    I only use them for HTTPS. Those little shits!

    Meaning your connection to them is http -- if so then yes, they /can/
    insert anything, and modify anything.

    Whether they should do so is a different argument.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Chris M. Thomasson@chris.m.thomasson.1@gmail.com to sci.crypt on Tue Nov 18 15:34:46 2025
    From Newsgroup: sci.crypt

    On 11/14/2025 6:24 PM, Rich wrote:
    Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:

    I only use them for HTTPS. Those little shits!

    Meaning your connection to them is http -- if so then yes, they /can/
    insert anything, and modify anything.

    Indeed. They must proxy it through them...


    Whether they should do so is a different argument.

    Yeah, no shit Rich! I wonder if they do this to many others as well. Oh Well... ;^o

    Its my fault for using a free HTTPS. Actually, I did not expect them to
    inject cloudflare shit into my code: Sigh.

    My online thing was just meant as a quick and dirty impl to show my HMAC cipher online. Basically, so people can play around with it without
    having to compile anything. It was never meant for a real service. But
    still, damn. cloudflare bastards! Argh!

    Shit happens.

    Actually, is there a way to get a real TRNG using javascript anyway?
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Chris M. Thomasson@chris.m.thomasson.1@gmail.com to sci.crypt on Tue Nov 18 15:56:49 2025
    From Newsgroup: sci.crypt

    On 11/18/2025 3:34 PM, Chris M. Thomasson wrote:
    On 11/14/2025 6:24 PM, Rich wrote:
    Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:

    I only use them for HTTPS. Those little shits!

    Meaning your connection to them is http -- if so then yes, they /can/
    insert anything, and modify anything.

    Indeed. They must proxy it through them...


    Whether they should do so is a different argument.

    Yeah, no shit Rich! I wonder if they do this to many others as well. Oh Well... ;^o

    Its my fault for using a free HTTPS. Actually, I did not expect them to inject cloudflare shit into my code: Sigh.

    My online thing was just meant as a quick and dirty impl to show my HMAC cipher online. Basically, so people can play around with it without
    having to compile anything. It was never meant for a real service. But still, damn. cloudflare bastards! Argh!

    Shit happens.

    Actually, is there a way to get a real TRNG using javascript anyway?

    This free service can inject anything it wants, and shall record all
    traffic to and traffic after our proxy wrt our free HTTPS.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Chris M. Thomasson@chris.m.thomasson.1@gmail.com to sci.crypt on Tue Nov 18 16:01:03 2025
    From Newsgroup: sci.crypt

    On 11/14/2025 6:24 PM, Rich wrote:
    Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:

    I only use them for HTTPS. Those little shits!

    Meaning your connection to them is http -- if so then yes, they /can/
    insert anything, and modify anything.

    Whether they should do so is a different argument.

    I wonder how many others they do it to, who think, oh this is secure for
    an online store or something, I only use them for free HTTPS. Keep in
    mind that they can rape incoming and outgoing data at will... ;^o
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Chris M. Thomasson@chris.m.thomasson.1@gmail.com to sci.crypt on Tue Nov 18 16:49:28 2025
    From Newsgroup: sci.crypt

    On 11/13/2025 4:18 AM, Radio Eriwan wrote:
    Chris M. Thomasson wrote:
    On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
    This cloudflare crap in my code that I did not write seems scary:

    They inject it on the fly?

    view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    WTF!?!?

    <script defer src="https://static.cloudflareinsights.com/beacon.min.js/
    vcd15cbe7772f49c399c6a5babf22c1241717689176015" integrity="sha512-
    ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ=="
    data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}'
    crossorigin="anonymous"></script>
    </body>
    </html>


    I only use them for HTTPS. Those little shits!

    Here is my test page for my test cipher:

    https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    Fucking cloudflare!

    But, that script can record plaintext before its encrypted?

    If that injected script, Eve can see the secret key, then my experiment
    is broken by default?

    No problem, because nobody is using your cipher for serious tasks. Efye



    Notice Experimental version 0.0.0.1 pre-alpha? I only make the online
    version to see if others can play around with it.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Rich@rich@example.invalid to sci.crypt on Wed Nov 19 16:26:00 2025
    From Newsgroup: sci.crypt

    Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
    On 11/14/2025 6:24 PM, Rich wrote:
    Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:

    I only use them for HTTPS. Those little shits!

    Meaning your connection to them is http -- if so then yes, they /can/
    insert anything, and modify anything.

    Indeed. They must proxy it through them...


    Whether they should do so is a different argument.

    Yeah, no shit Rich! I wonder if they do this to many others as well. Oh Well... ;^o

    Its my fault for using a free HTTPS. Actually, I did not expect them to inject cloudflare shit into my code: Sigh.

    https://en.wikipedia.org/wiki/Let's_Encrypt

    Free SSL certs -- you do need to configure your webserver to use them
    (and setup auto-renew, which this is useful for
    https://dehydrated.io/).

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Rich@rich@example.invalid to sci.crypt on Wed Nov 19 16:26:53 2025
    From Newsgroup: sci.crypt

    Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
    On 11/18/2025 3:34 PM, Chris M. Thomasson wrote:
    On 11/14/2025 6:24 PM, Rich wrote:
    Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:

    I only use them for HTTPS. Those little shits!

    Meaning your connection to them is http -- if so then yes, they /can/
    insert anything, and modify anything.

    Indeed. They must proxy it through them...


    Whether they should do so is a different argument.

    Yeah, no shit Rich! I wonder if they do this to many others as well. Oh
    Well... ;^o

    Its my fault for using a free HTTPS. Actually, I did not expect them to
    inject cloudflare shit into my code: Sigh.

    My online thing was just meant as a quick and dirty impl to show my HMAC
    cipher online. Basically, so people can play around with it without
    having to compile anything. It was never meant for a real service. But
    still, damn. cloudflare bastards! Argh!

    Shit happens.

    Actually, is there a way to get a real TRNG using javascript anyway?

    This free service can inject anything it wants, and shall record all
    traffic to and traffic after our proxy wrt our free HTTPS.

    That is a universal truth for all proxies where you the original sender
    are not encrypting the data before sending it to the proxy.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Chris M. Thomasson@chris.m.thomasson.1@gmail.com to sci.crypt on Wed Nov 19 12:28:12 2025
    From Newsgroup: sci.crypt

    On 11/19/2025 8:26 AM, Rich wrote:
    Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
    On 11/18/2025 3:34 PM, Chris M. Thomasson wrote:
    On 11/14/2025 6:24 PM, Rich wrote:
    Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:

    I only use them for HTTPS. Those little shits!

    Meaning your connection to them is http -- if so then yes, they /can/
    insert anything, and modify anything.

    Indeed. They must proxy it through them...


    Whether they should do so is a different argument.

    Yeah, no shit Rich! I wonder if they do this to many others as well. Oh
    Well... ;^o

    Its my fault for using a free HTTPS. Actually, I did not expect them to
    inject cloudflare shit into my code: Sigh.

    My online thing was just meant as a quick and dirty impl to show my HMAC >>> cipher online. Basically, so people can play around with it without
    having to compile anything. It was never meant for a real service. But
    still, damn. cloudflare bastards! Argh!

    Shit happens.

    Actually, is there a way to get a real TRNG using javascript anyway?

    This free service can inject anything it wants, and shall record all
    traffic to and traffic after our proxy wrt our free HTTPS.

    That is a universal truth for all proxies where you the original sender
    are not encrypting the data before sending it to the proxy.

    Yeah. Luckily, my online version is just a test and not meant to be used
    for the real deal. version 0.0.0.1 and experimental should hopefully get
    that point across. Since its 100% client side, I guess somebody can
    download my code and run the site local on a computer that is not
    connected to anything, no internet, no network, ect... It will still
    work fine. Sigh. I don't like that they injected code into my code...
    Grrrr! ;^o damn it.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Chris M. Thomasson@chris.m.thomasson.1@gmail.com to sci.crypt on Wed Nov 19 12:32:40 2025
    From Newsgroup: sci.crypt

    On 11/19/2025 8:26 AM, Rich wrote:
    Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
    On 11/14/2025 6:24 PM, Rich wrote:
    Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:

    I only use them for HTTPS. Those little shits!

    Meaning your connection to them is http -- if so then yes, they /can/
    insert anything, and modify anything.

    Indeed. They must proxy it through them...


    Whether they should do so is a different argument.

    Yeah, no shit Rich! I wonder if they do this to many others as well. Oh
    Well... ;^o

    Its my fault for using a free HTTPS. Actually, I did not expect them to
    inject cloudflare shit into my code: Sigh.

    https://en.wikipedia.org/wiki/Let's_Encrypt

    Free SSL certs -- you do need to configure your webserver to use them
    (and setup auto-renew, which this is useful for
    https://dehydrated.io/).


    Yeah, thanks Rich. I should have some more time to do it. Get away from cloudfairy dust blowing its injections into my actual code. Luckily for
    me, well, my page is clearly marked experimental and is 100% client
    side. But god damn. That injected script pissed me off pretty god damn
    bad. Sigh.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Chris M. Thomasson@chris.m.thomasson.1@gmail.com to sci.crypt on Wed Nov 19 12:35:25 2025
    From Newsgroup: sci.crypt

    On 11/13/2025 4:18 AM, Radio Eriwan wrote:
    Chris M. Thomasson wrote:
    On 11/13/2025 3:02 AM, Chris M. Thomasson wrote:
    This cloudflare crap in my code that I did not write seems scary:

    They inject it on the fly?

    view-source:https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    WTF!?!?

    <script defer src="https://static.cloudflareinsights.com/beacon.min.js/
    vcd15cbe7772f49c399c6a5babf22c1241717689176015" integrity="sha512-
    ZpsOmlRQV6y907TI0dKBHq9Md29nnaEIPlkf84rnaERnq6zvWvPUqr2ft8M1aS28oN72PdrCzSjY4U6VaAw1EQ=="
    data-cf-beacon='{"version":"2024.11.0","token":"316b379622504f42b8352974d52d4fe1","r":1,"server_timing":{"name":{"cfCacheStatus":true,"cfEdge":true,"cfExtPri":true,"cfL4":true,"cfOrigin":true,"cfSpeedBrain":true},"location_startswith":null}}'
    crossorigin="anonymous"></script>
    </body>
    </html>


    I only use them for HTTPS. Those little shits!

    Here is my test page for my test cipher:

    https://fractallife247.com/test/hmac_cipher/ver_0_0_0_1/

    Fucking cloudflare!

    But, that script can record plaintext before its encrypted?

    If that injected script, Eve can see the secret key, then my experiment
    is broken by default?

    No problem, because nobody is using your cipher for serious tasks. Efye



    Fwiw, here is an older C impl I created:

    (when you get some time, read all) https://groups.google.com/g/comp.lang.c/c/a53VxN8cwkY/m/WIxIwoK7DAAJ

    https://pastebin.com/raw/feUnA3kP
    (raw text, no pastebin add infested garbage)

    Well, fire up a C compiler. ;^)
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Radio Eriwan@bounce.me@radio-eriwan.ru to sci.crypt on Wed Nov 19 23:58:18 2025
    From Newsgroup: sci.crypt

    Chris M. Thomasson once wrote:

    Fwiw, here is an older C impl I created:

    (when you get some time, read all) https://groups.google.com/g/comp.lang.c/c/a53VxN8cwkY/m/WIxIwoK7DAAJ

    https://pastebin.com/raw/feUnA3kP
    (raw text, no pastebin add infested garbage)

    Well, fire up a C compiler. ;^)

    Why should someone fire up a C compiler, and read GG, when all modern
    people use Go or Rust, for security/privacy/anonymity related tasks?

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Chris M. Thomasson@chris.m.thomasson.1@gmail.com to sci.crypt on Wed Nov 19 13:21:00 2025
    From Newsgroup: sci.crypt

    On 11/19/2025 12:58 PM, Radio Eriwan wrote:
    Chris M. Thomasson once wrote:

    Fwiw, here is an older C impl I created:

    (when you get some time, read all)
    https://groups.google.com/g/comp.lang.c/c/a53VxN8cwkY/m/WIxIwoK7DAAJ

    https://pastebin.com/raw/feUnA3kP
    (raw text, no pastebin add infested garbage)

    Well, fire up a C compiler. ;^)

    Why should someone fire up a C compiler,

    To be able to compile and run my experimental C impl of my HMAC cipher?


    and read GG, when all modern
    people use Go or Rust, for security/privacy/anonymity related tasks?


    Sigh.
    --- Synchronet 3.21a-Linux NewsLink 1.2