| Welcome to Crypto. We hope you enjoy your visit. You're currently viewing our forum as a guest. This means you are limited to certain areas of the board and there are some features you can't use. If you join our community, you'll be able to access member-only sections, and use many member-only features such as customizing your profile, sending personal messages, and voting in polls. Registration is simple, fast, and completely free. Join our community! If you're already a member please log in to your account to access all of our features: |
| A Python code for columnar transposition with RS44 (crossword puzzle) like matrices | |
|---|---|
| Tweet Topic Started: Jan 15 2014, 11:08 AM (2,673 Views) | |
| mok-kong shen | Jan 25 2014, 06:10 PM Post #16 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
Frankly I have on the other hand a distaste of the kind of software you recommended, for it's not in open-source but an exe-file. Firstly, one can have no chance to understand its construction and hence be sure that it always works fine. Secondly, such binary files are risky due to possibility of being manipulated to contain backdoors etc. (one has to be extremely careful in this respect IMHO in our post-Orwellian era). Edited by mok-kong shen, Jan 25 2014, 06:11 PM.
|
![]() |
|
| novice | Jan 25 2014, 06:40 PM Post #17 |
|
Super member
![]() ![]() ![]() ![]() ![]() ![]()
|
@ Mok Kong Shen I guess we are coming from different standpoints -- you from the intellectual point of view and me from the users'. There is room in the world for both of us novice |
![]() |
|
| mok-kong shen | Jan 25 2014, 06:47 PM Post #18 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
@novice: (1) Security of his computer system is also a vital user interest, if I don't err. (2) You haven't yet answered my question of which (concrete) features (functionalities) besides GUI the software recommended by you provides that are over/beyond those that are implemented in my code. Edited by mok-kong shen, Jan 25 2014, 06:59 PM.
|
![]() |
|
| novice | Jan 25 2014, 07:10 PM Post #19 |
|
Super member
![]() ![]() ![]() ![]() ![]() ![]()
|
Yes that is true. But in practice there are reputable authors and reputable sites on the Internet where programs may be run safely. For example Geoff Sullivan's program was mentioned in the original Cryptologia paper 10 years ago and there has not been a single observation by or to Cryptologia that there are risks in running it. Another example, Dirk Rijmenant's website includes a number of machine simulations, none of which has ever given me problems or been criticised as dangerous to use. And another example, GrIp often posts Excel programs on this site, none of which have given rise to any problem to me or complaints from others. There is a gulf between what is true in theory and what is so in practice.
And you haven't answered mine as to where I find these features in your program! I think this discussion is going round in circles and is best left. Edited by novice, Jan 25 2014, 07:28 PM.
|
![]() |
|
| mok-kong shen | Jan 25 2014, 07:27 PM Post #20 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
IMHO, this kind of thought is fairly problematic now (especially since the revelations by a certain whistleblower). Even if you could assume (with what kind of materials?) that a certain private person unknown to you is ok, you have barely assurance that his computer has not been successfully attacked and hence the stuffs downloadable from his site could have been manipulated without his knowledge. |
![]() |
|
| novice | Jan 25 2014, 07:31 PM Post #21 |
|
Super member
![]() ![]() ![]() ![]() ![]() ![]()
|
I have edited my last posting while you were posting!-- have a look at it.
You are getting into the realms of fantasy. I have no certainty that I won't be knocked down and killed crossing the street tomorrow but it hasn't happened yet and the thought that it might will not stop me from crossing tomorrow -- with due diligence of course
|
![]() |
|
| mok-kong shen | Jan 25 2014, 07:35 PM Post #22 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
I calculate with a certain non-trivial probability from what you wrote that you don't have a virus scanner installed on your computer. In fact, I happened to have been informed that the very particular piece of software that you recommended earlier didn't pass the scrutiny of a certain security software. (Such security software could of course err, but that fact is nonetheless thought provoking IMHO.) Edited by mok-kong shen, Jan 25 2014, 07:41 PM.
|
![]() |
|
| novice | Jan 25 2014, 07:43 PM Post #23 |
|
Super member
![]() ![]() ![]() ![]() ![]() ![]()
|
I am afraid you have put 2 and 2 together ands made 5. My old computer packed up after 7 years of pretty heavy use and I bought a new iMac 2 weeks ago. It came with antivirus software. As a matter of interest it also has flash memory rather than a hard drive and everything loads faster than on my old Mac. |
![]() |
|
| mok-kong shen | Jan 25 2014, 07:45 PM Post #24 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
@novice: I edited my earlier post. Did you read what I added in the meantime? |
![]() |
|
| novice | Jan 25 2014, 07:50 PM Post #25 |
|
Super member
![]() ![]() ![]() ![]() ![]() ![]()
|
Seems you were misinformed. |
![]() |
|
| mok-kong shen | Jan 25 2014, 07:52 PM Post #26 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
You said in another context that you could easily trust some persons who are even unkown to you. I think that I have in comparison more reasons to trust what my acquaintance told me.
Edited by mok-kong shen, Jan 25 2014, 07:53 PM.
|
![]() |
|
| novice | Jan 25 2014, 07:56 PM Post #27 |
|
Super member
![]() ![]() ![]() ![]() ![]() ![]()
|
Which software are you referring to as infected? |
![]() |
|
| mok-kong shen | Jan 25 2014, 07:57 PM Post #28 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
The RS44 software with the praised nice GUI. |
![]() |
|
| novice | Jan 25 2014, 07:59 PM Post #29 |
|
Super member
![]() ![]() ![]() ![]() ![]() ![]()
|
Since that is no longer available for download from Geoff Sullivan, how can your acquaintance have found it infected? And by the way, Geoff Sullivan is a v. reputable person, a colleague of Frode Weierud also a v. reputable person. I am very surprised at your allegations. Edited by novice, Jan 25 2014, 08:03 PM.
|
![]() |
|
| mok-kong shen | Jan 25 2014, 08:04 PM Post #30 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
Very strange that's no longer available!!! Since when? It must be in these days. For my acquaintance learned the link from me and I from you. Perhaps the owner remarked the coup of the malicious guys or agencies and has thus removed the stuff. (So you have to take a more conservative standpoint in respect of Internet security in future, I suppose.)
Edited by mok-kong shen, Jan 25 2014, 08:09 PM.
|
![]() |
|
| 1 user reading this topic (1 Guest and 0 Anonymous) | |
| Go to Next Page | |
| « Previous Topic · General · Next Topic » |





![]](http://z2.ifrm.com/static/1/pip_r.png)



7:28 PM Jul 11