Welcome Guest [Log In] [Register]
Welcome to Crypto. We hope you enjoy your visit.


You're currently viewing our forum as a guest. This means you are limited to certain areas of the board and there are some features you can't use. If you join our community, you'll be able to access member-only sections, and use many member-only features such as customizing your profile, sending personal messages, and voting in polls. Registration is simple, fast, and completely free.


Join our community!


If you're already a member please log in to your account to access all of our features:

Username:   Password:
Add Reply
A Python code for columnar transposition with RS44 (crossword puzzle) like matrices
Topic Started: Jan 15 2014, 11:08 AM (2,673 Views)
mok-kong shen
NSA worthy
[ *  *  *  *  *  * ]
novice
Jan 24 2014, 04:08 PM
If you post a program that is meant to be of some utility to a user (especially a user not used to programming) then it should be interactive. The user should not have to delve through the code to try and understand the program and find where to insert his chosen parameters. The program I complain of is a case in point.
Frankly I have on the other hand a distaste of the kind of software you recommended, for it's not in open-source but an exe-file. Firstly, one can have no chance to understand its construction and hence be sure that it always works fine. Secondly, such binary files are risky due to possibility of being manipulated to contain backdoors etc. (one has to be extremely careful in this respect IMHO in our post-Orwellian era).
Edited by mok-kong shen, Jan 25 2014, 06:11 PM.
Offline Profile Quote Post Goto Top
 
novice
Super member
[ *  *  *  * ]
@ Mok Kong Shen

I guess we are coming from different standpoints -- you from the intellectual point of view and me from the users'. There is room in the world for both of us :)

novice
Offline Profile Quote Post Goto Top
 
mok-kong shen
NSA worthy
[ *  *  *  *  *  * ]
@novice:

(1) Security of his computer system is also a vital user interest, if I don't err.

(2) You haven't yet answered my question of which (concrete) features (functionalities) besides GUI the software recommended by you provides that are over/beyond those that are implemented in my code.
Edited by mok-kong shen, Jan 25 2014, 06:59 PM.
Offline Profile Quote Post Goto Top
 
novice
Super member
[ *  *  *  * ]
MKS
 
Security of his computer system is also a vital user interest, if I don't err.


Yes that is true. But in practice there are reputable authors and reputable sites on the Internet where programs may be run safely. For example Geoff Sullivan's program was mentioned in the original Cryptologia paper 10 years ago and there has not been a single observation by or to Cryptologia that there are risks in running it. Another example, Dirk Rijmenant's website includes a number of machine simulations, none of which has ever given me problems or been criticised as dangerous to use. And another example, GrIp often posts Excel programs on this site, none of which have given rise to any problem to me or complaints from others.

There is a gulf between what is true in theory and what is so in practice.

MKS
 
You haven't yet answered my question of which (concrete) features (functionalities) besides GUI the software recommended by you provides that are over/beyond those that are implemented in my code.


And you haven't answered mine as to where I find these features in your program!

I think this discussion is going round in circles and is best left.
Edited by novice, Jan 25 2014, 07:28 PM.
Offline Profile Quote Post Goto Top
 
mok-kong shen
NSA worthy
[ *  *  *  *  *  * ]
novice
Jan 25 2014, 07:10 PM
MKS
 
Security of his computer system is also a vital user interest, if I don't err.

Yes that is true. But in practice there are reputable authors and reputable sites on the Internet where programs may be run safely.
IMHO, this kind of thought is fairly problematic now (especially since the revelations by a certain whistleblower). Even if you could assume (with what kind of materials?) that a certain private person unknown to you is ok, you have barely assurance that his computer has not been successfully attacked and hence the stuffs downloadable from his site could have been manipulated without his knowledge.
Offline Profile Quote Post Goto Top
 
novice
Super member
[ *  *  *  * ]
I have edited my last posting while you were posting!-- have a look at it.

MKS
 
you have barely assurance that his computer has not been successfully attacked and hence the stuffs downloadable from his site could have been manipulated without his knowledge.


You are getting into the realms of fantasy. I have no certainty that I won't be knocked down and killed crossing the street tomorrow but it hasn't happened yet and the thought that it might will not stop me from crossing tomorrow -- with due diligence of course :)
Offline Profile Quote Post Goto Top
 
mok-kong shen
NSA worthy
[ *  *  *  *  *  * ]
novice
Jan 25 2014, 07:31 PM
You are getting into the realms of fantasy.
I calculate with a certain non-trivial probability from what you wrote that you don't have a virus scanner installed on your computer.

In fact, I happened to have been informed that the very particular piece of software that you recommended earlier didn't pass the scrutiny of a certain security software. (Such security software could of course err, but that fact is nonetheless thought provoking IMHO.)
Edited by mok-kong shen, Jan 25 2014, 07:41 PM.
Offline Profile Quote Post Goto Top
 
novice
Super member
[ *  *  *  * ]
I am afraid you have put 2 and 2 together ands made 5. My old computer packed up after 7 years of pretty heavy use and I bought a new iMac 2 weeks ago. It came with antivirus software.

As a matter of interest it also has flash memory rather than a hard drive and everything loads faster than on my old Mac.
Offline Profile Quote Post Goto Top
 
mok-kong shen
NSA worthy
[ *  *  *  *  *  * ]
@novice: I edited my earlier post. Did you read what I added in the meantime?
Offline Profile Quote Post Goto Top
 
novice
Super member
[ *  *  *  * ]
Quote:
 
I edited my earlier post. Did you read what I added in the meantime?


Seems you were misinformed.
Offline Profile Quote Post Goto Top
 
mok-kong shen
NSA worthy
[ *  *  *  *  *  * ]
You said in another context that you could easily trust some persons who are even unkown to you. I think that I have in comparison more reasons to trust what my acquaintance told me.
Edited by mok-kong shen, Jan 25 2014, 07:53 PM.
Offline Profile Quote Post Goto Top
 
novice
Super member
[ *  *  *  * ]
Which software are you referring to as infected?
Offline Profile Quote Post Goto Top
 
mok-kong shen
NSA worthy
[ *  *  *  *  *  * ]
novice
Jan 25 2014, 07:56 PM
Which software are you referring to as infected?
The RS44 software with the praised nice GUI.
Offline Profile Quote Post Goto Top
 
novice
Super member
[ *  *  *  * ]
Since that is no longer available for download from Geoff Sullivan, how can your acquaintance have found it infected?

And by the way, Geoff Sullivan is a v. reputable person, a colleague of Frode Weierud also a v. reputable person. I am very surprised at your allegations.
Edited by novice, Jan 25 2014, 08:03 PM.
Offline Profile Quote Post Goto Top
 
mok-kong shen
NSA worthy
[ *  *  *  *  *  * ]
Very strange that's no longer available!!! Since when? It must be in these days. For my acquaintance learned the link from me and I from you. Perhaps the owner remarked the coup of the malicious guys or agencies and has thus removed the stuff. (So you have to take a more conservative standpoint in respect of Internet security in future, I suppose.)
Edited by mok-kong shen, Jan 25 2014, 08:09 PM.
Offline Profile Quote Post Goto Top
 
1 user reading this topic (1 Guest and 0 Anonymous)
Go to Next Page
« Previous Topic · General · Next Topic »
Add Reply