[ExI] The second step towards immortality
sustrik at 250bpm.com
Thu Jan 2 20:21:08 UTC 2014
-----BEGIN PGP SIGNED MESSAGE-----
On 02/01/14 21:07, Adrian Tymes wrote:
> On Jan 2, 2014 11:09 AM, "Martin Sustrik" <sustrik at 250bpm.com>
>> In short, the program would be fully encrypted (including the
>> private key is uses for Bitcoin transactions) and evaluated in
>> its encrypted form. It would never be decrypted.
> Then how does it get run? At some point, in some layer of the
> memory space, it needs to be decrypted in order to execute.
No. That's the point of homomorphic encryption. Take homomorphic
multiplication: E(a.b) = E(a).E(b)
You multiply two encrypted values and you get encrypted result. Still,
you have no idea about values of a, b or the result itself.
> For example, let us take a program that opens a socket to port 80
> on another machine. At some point, the program will actually have
> in memory the values for 80 and the other machine's address -
> either IP or DNS. The emulator can recognize this and write what
> those to a file, then play memory values back in time until the
> keys are found.
Won't work. The key was never in memory in decrpyted form.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
-----END PGP SIGNATURE-----
More information about the extropy-chat