[ExI] The second step towards immortality

Martin Sustrik sustrik at 250bpm.com
Thu Jan 2 20:21:08 UTC 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 02/01/14 21:07, Adrian Tymes wrote:
> On Jan 2, 2014 11:09 AM, "Martin Sustrik" <sustrik at 250bpm.com>
> wrote:
>> In short, the program would be fully encrypted (including the
>> private key is uses for Bitcoin transactions) and evaluated in
>> its encrypted form. It would never be decrypted.
> 
> Then how does it get run?  At some point, in some layer of the
> memory space, it needs to be decrypted in order to execute.

No. That's the point of homomorphic encryption. Take homomorphic
multiplication: E(a.b) = E(a).E(b)

You multiply two encrypted values and you get encrypted result. Still,
you have no idea about values of a, b or the result itself.

> For example, let us take a program that opens a socket to port 80
> on another machine.  At some point, the program will actually have
> in memory the values for 80 and the other machine's address -
> either IP or DNS.  The emulator can recognize this and write what
> those to a file, then play memory values back in time until the
> keys are found.

Won't work. The key was never in memory in decrpyted form.

Martin

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSxco0AAoJENTpVjxCNN9YGCUH/A9FOoiofmXBCD+dsVVH0CGc
bEZunSefKQVQafPnRPXGQkhTXZPQpBhQHnFM7sOR6AYba6+QqsmacZ4HU4e1JrSO
Wl7X3H9pV3ErU9gH4EAtn9C1Fr0qfGhc46YJBGxcIppNP5caYbqLVg4D41L2YzCM
fx3UFx9fjrRBMQIILIIADLPuktw4XArT6VewQUijr5LIEXT3lou6bEBc17tS1m6A
Koxvg2SnJJmG+odzSN+N9sjRZw1iCaIihgde3sXWf9XVlpxHwU7LXDHD6eggLQ3G
2Bu6FrEQVJw0fimjh4rOsr+jvV5M+ClE/Vp+FJeMSVG8UVmceu5Fsszt/0rq2NY=
=XJz2
-----END PGP SIGNATURE-----



More information about the extropy-chat mailing list