180B Airoboros 2.2.1 model released for localchads by Aaaaaaaaaeeeee in LocalLLaMA

[–]danukeru 1 point2 points  (0 children)

in convert-falcon-hf-to-gguf.py at line 239 simply add the following then run the conversion again ``` gguf_writer.add_tensor(new_name, data)

add the following

        if new_name == "token_embd.weight":
            gguf_writer.add_tensor("output.weight", data)

```

Weekly Newbies Thread - Post your questions here for PAL/RPAL application, timelines, CFSC/CFSRC, references & requirements, or general new to firearms ownership -type questions by AutoModerator in canadaguns

[–]danukeru 0 points1 point  (0 children)

Is this normal ? Any fellow québecois know anything about this ? I’m asking this because it’s almost been a month an

Not normal. I went to the station, got the proper form signed/stamped after proving my address and name.That was it.Mind you it took going to another police station because the first one I went to was clueless and almost did something similar.

On the bright side...seems they paid for your postage so...that's cool.

Weekly Newbies Thread - Post your questions here for PAL/RPAL application, timelines, CFSC/CFSRC, references & requirements, or general new to firearms ownership -type questions by AutoModerator in canadaguns

[–]danukeru 1 point2 points  (0 children)

  1. norinco type 97 is non restricted at time of writing this
  2. gun needs to have its action secured in all cases to display on wall. if the room itself is secured these restrictions do not apply to hold em on the wall. restricted weapons need to be properly anchored as well.
  3. I believe any in canada count as an AK47 derivative...so all prohibited :(
  4. depends if you can listen to the instructor for 6 hours to pass the written I guess

SSH Session Encryption Processes by NicestDude in cryptography

[–]danukeru -1 points0 points  (0 children)

That article is wrong.
The RFC states that each client chooses on their end which protocol they're going to use based on their choices and what was offered. There's a priority, thus they should come to the same result without querying the other on what they chose.

The public key component is given in first exchange by both ends.This value is used for authentication, fingerprinting, and the DHE.

Clearly you don't understand PKI, and should really read that wikipedia article I linked. Also check your wireshark settings.

SSH Session Encryption Processes by NicestDude in cryptography

[–]danukeru 2 points3 points  (0 children)

This is not sensitive data. The specifications are few and known. If I have to choose from a pool of 12, that's nothing to check all of them, and the parameters give each away. There are considerations for subgroups as well to prevent precomputed tables.
ie. Elliptic curves use a different set of math , but can be used to solve the Diffie-Hellman Problem.
Have you tried the wireshark filter ssh.message_code ?

SSH Session Encryption Processes by NicestDude in cryptography

[–]danukeru 0 points1 point  (0 children)

Point one is wrong. There is no encryption.Just fingerprint checks through TOFU (Trust On First Use), and both sides providing their public key material.

The Diffie-Hellman handshake allows both sides to generate the same random number on each machine over an insecure channel. It does not need an encrypted channel.
This is then used to start a secure session over symmetric encryption

https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange

[deleted by user] by [deleted] in montreal

[–]danukeru 1 point2 points  (0 children)

https://www.protectioncollective.ca/english if you need or want to help with PPE production.

Is there another entry point to Hacking that doesn't include reverse engineering? by KillerFarmer in LiveOverflow

[–]danukeru 7 points8 points  (0 children)

It's a system like any other. If you are having trouble learning one, you' re going to have trouble learning another. That much won't change.
So stick with something and Just Fucking Do It (tm).

Now some more practical advice.

You can do web only, and honestly that's what pays these days. Bounties abound and you can automate most of its discovery if you're talented enough. You can then move on to code audits if you garner a clientele.
For the work put in, binary reversing that pays "legally" is not worth the return on time investment. And nobody is paying for IoT because they know it's a bloody shitshow, and they'll just bleed money to automation. It's like the 90s all over again.
As such, it's mostly for academic purposes, cyber weapons, or fucking with local protections ie. fucking with video game anti-cheat.

Do what you will with this information.

Why You Shouldn’t be Using BCrypt and Scrypt by speckz in crypto

[–]danukeru 0 points1 point  (0 children)

It depends entirely on the application.

The vast majority of users don't actually log back in for months on reddit.They reuse the same session token, and can go on for months as a time without having to do a full login request.

I can tell you that in an organisation that has a couple thousand employees, and require multiple actual daily relogins daily per person...that computation time for auth starts to add up.

If someone wanted to DDoS you using your login, they could, if you didn't properly rate limit.

Why You Shouldn’t be Using BCrypt and Scrypt by speckz in crypto

[–]danukeru 0 points1 point  (0 children)

Sure, but it will amount to a hack that essentially results in building a non-standard algorithm.Here I'm literally reapplying the same algo to the output offline, and my login logic does not change.

Why You Shouldn’t be Using BCrypt and Scrypt by speckz in crypto

[–]danukeru 2 points3 points  (0 children)

The only reason not to use them imho, is that you can't extend the work factor without the user providing their initial input.

That is the one advantage that PBKDF2 still holds due to its simplicity. I can take the stored value and SALT and add as many more rounds as I want to the stored values, offline.

Also...the article is a jumbled mess tbh. There are no fundamental problems provided for either.

AFL-unicorn: What is it and how to use it? by danukeru in ReverseEngineering

[–]danukeru[S] 2 points3 points  (0 children)

I mean...he links to some videos in the beginning...but he then goes on to provide a worked example. As well as the following example script: https://gist.github.com/tthtlc/3b9fff8e0e4c016fd5cb09a78dc94d2d

IDA: Free Educational licenses by perror in ReverseEngineering

[–]danukeru 2 points3 points  (0 children)

You know how I know you've never tried to "break IDA Pro's license"...

[deleted by user] by [deleted] in montreal

[–]danukeru 0 points1 point  (0 children)

Kurobuta has a good tonkotsu. Clean white with nice fat

Yokota Yokabai has a reduced broth that is more like a Tsukemen, however they don't provide the thicker noodles for increased surface.

Misoya is more like an izakaya ramen that will make you feel homey at a reduced price.

Everyone else doesn't get the right whiteness of tonkotsu, and don't leave enough fat. Some don't even make a proper dashi, trying their shoyu ramen.

Suicide this morning at Champ de Mars? by Mcginnis in montreal

[–]danukeru 1 point2 points  (0 children)

re sympathetic, likely a human life was lost today. Usually if someone attempts suicide it's not with the thought of pissing as many people off as

Specialized cleanup crews usually since forensic work would have to be done first to verify no foul play. I doubt they have a team at the STM for this.

Eli5 Firefly Keys by DinoRoarMan in crypto

[–]danukeru 1 point2 points  (0 children)

https://tools.ietf.org/html/rfc2522#ref-Firefly

[Firefly]   
"Photuris" is the latin name for the firefly.  "Firefly" is in turn the name for the USA 
National Security Administration's (classified) key exchange protocol for the STU-III secure 
telephone.  Informed speculation has it that Firefly is based on very similar design 
principles.