flat assembler
Message board for the users of flat assembler.
![]() Goto page Previous 1, 2 |
Author |
|
lazer1 23 Aug 2008, 18:06
it is useful to at least have a define dqword 0, where all bits are 0.
that is useful for: struc xmm_values { .xmm0 do 0 .xmm1 do 0 .... .xmm15 do 0 .mm0 dq 0 } virtual at 0 xmm_values xmm_values end virtual movupd [ rax + xmm_values.xmm0 ], xmm0 movupd [ rax + xmm_values.xmm1 ], xmm1 .... here the type is 128 UNINTERPRETED bits, ie multi-type, and eg the following is an ERROR: movupd [ rax + xmm_values.mm0 ], xmm0 ; WRONG! because the dest operand has type 64 uninterpreted bits. movupd dqword [ rax + xmm_values.mm0 ], xmm0 ; CORRECT! |
|||
![]() |
|
lazer1 23 Aug 2008, 19:30
revolution wrote: PGP is not banned in the US. Where do you get that idea? the guy who created it got into trouble, I think for use in the USA it needs a backdoor for the CIA. excerpt from PGP: Quote:
according to that PGP 2.6.3i cannot be used in the US although the reason given above is patent laws. Quote:
I am not an expert on this! I think in the US you arent allowed to use encryption unless the CIA (or is it FBI) can listen in. You probably need to supply the key encrypted via a CIA key. That way the CIA can always listen in but others cannot. but you could always get around that by storing an encrypted message in the lower bits of an audio file! Quote:
according to the PGP key generator: 512 bits : low commercial grade, 768 bits : high commercial grade 1024 bits : military grade I use 1030 bits! it takes a bit of time to encrypt a 2mb compressed archive. Quote:
the idea is to unencrypt, work on the unencrytped version and then right at the end re-encrypt and permanently erase the unencrypted version eg by doing a full reformat of a small temporary volume. amongst other things this methodology forces you to have plenty of backups, Quote:
what is the principle of those? Quote:
that is a disadvantage for military use as the enemy can capture a soldier and find the key by torture. ![]() (we have ways of making you talk!) with PGP as long as the soldier destroys the private key they cannot find it by torture. ![]() keep the key on a special USB drive which self destructs if you press a button! ![]() Quote:
I was quoting it the way I understood it which could be different from what he meant! everyone interprets the same text differently, I genuinely interpreted what he said the way I quoted it. for most uses anyway you dont need more than 64 bits, its just for very specialised situations where you need that, often you just need 32 bits. But to deal with a 120G drive you need to go beyond 32 bit. and a DVD is a bit more than 32 bits, 4.7G according to the label. |
|||
![]() |
|
vid 23 Aug 2008, 19:36
Quote: for most uses anyway you dont need more than 64 bits, its just for very specialised situations where you need that, often you just How about pointers on x64 machine - not a "common case"? |
|||
![]() |
|
revolution 23 Aug 2008, 19:37
lazer1: Your information is so old now that it has become inaccurate. PGP is NOT banned in the US (and has never been banned in the US) for any purpose. It was once, in the distant past, banned from EXPORT out of the US, that was all, but that restriction was lifted about 10 years ago. There is no requirement for a backdoor either.
If you are concerned about being tortured to get your key then I suggest you don't use any encryption. How is your life worth more than the data you have? |
|||
![]() |
|
revolution 23 Aug 2008, 19:39
lazer1: have a look at truecrypt (google it), it probably does just what you need.
|
|||
![]() |
|
MCD 24 Aug 2008, 05:12
lazer1: also, using 1030 bit key instead of 1024 bit is a joke. Either 1024bit is enough for you, or you should use 1536bits, 2048bits...
|
|||
![]() |
|
vid 24 Aug 2008, 07:53
Quote: it takes a bit of time to encrypt a 2mb compressed archive. That's why sane people use RSA only to encrypt AES key, and then encrypt actual big data with AES/EAX, or something like that. |
|||
![]() |
|
Goto page Previous 1, 2 < Last Thread | Next Thread > |
Forum Rules:
|
Copyright © 1999-2023, Tomasz Grysztar. Also on GitHub, YouTube.
Website powered by rwasa.