by azeemba on 7/28/24, 5:27 PM with 67 comments
by card_zero on 7/28/24, 7:07 PM
https://en.wikipedia.org/wiki/R_Scuti
* The light from it is variable,
* This variation is continuous, not a rare event,
* It's 4,000 light years away, so the butterfly effect is irrelevant because the light is already on its way,
* It's chaotic and unpredictable.
Basically a reliable stream of random data. I guess the only problem is that you need to know what observations of its light levels were, throughout the 80s, if the records even exist.
Edit: "The AAVSO International Database currently contains over 110,000 observations of this erratic star spanning nearly a century of activity." There you go, that should provide a thousand measurements to base a key on in any given year.
by slicktux on 7/28/24, 6:03 PM
“ I hacked time to recover $3 million from a Bitcoin software wallet”
Just put a program in the computer that generates a ‘random’ key based on time of day and second…and it does this every day at pre defined hours…and maybe some way that the time and date can’t be modified. Then, only when that day and time comes will the right key be generated and the files decrypted. Program does not know when that date is it just bases the key generation on time and date.
by mrrccc on 7/28/24, 8:20 PM
They even provided a fully operational, web-based, open-source implementation: https://timevault.drand.love
by kdkdodiei4 on 7/28/24, 6:34 PM
by nickdothutton on 7/28/24, 6:26 PM
by motohagiography on 7/28/24, 7:03 PM
If you are protecting the secret from non-time travelers, you're probably fine, but if you are protecting it from other time travellers, your compute or proof of work has to be more expensive than their time-travel propulsion energy units.
We have this same problem with device attestation, where if the key exists in the same "universe" (hardware substrate) as the ciphertext, you're effectively fighting time travellers because they can run, re-run, use side channels, insert a breakpoint anywhere along the way. The current solutions are in the domains of physical tamper proofing, "white box" cryptography and other obfuscation schemes, and ultimately fully homomorphic encryption (FHE).
FHE would be the necessary solution against time travellers in this case because no matter where in time they were, they would have to be present at the instant the compute operation completes- and then you're into a race condition against Planck time to see who can grab the result of the computation first when it finishes. (assuming they can't infer or predict the result earlier than the completion of the FHE computation, that earlier decryption rounds don't reduce the time it takes to brute force the rest of it in a parallel stopped-timeline, and that Planck time still means anything in a universe where time isn't unidirectional and scalar)
Writing wise, there would have to be a hitch in their time travel scheme where to work it needed randomness and a lack of precision for some important quantum uncertainty reason, and the race to be present for the FHE decryption before the time travellers resolved their precision problem would drive the plot.
don't be discouraged though, a cursory reading of scientific discovery shows that impossible is mostly a convention, and cryptography historically reduces to a gentleman's agreement.
by paulmendoza on 7/28/24, 6:46 PM
by K0balt on 7/28/24, 6:34 PM
Other than that the key must be based in a purely deterministic algorithm to be immune to butterfly factors, which can always be brute forced by accelerating the civilization to fractional relativistic velocities or bringing it close to an extremely massive object. (Leaving the keygen at rest) Of course other ways to brute force such a key generator are probably more practical, but a relativistic attack is the steel man for the impossibility of reliability.
Stealth might be the best bet, an undersea bouy that pops up and broadcasts the key at the specified time or something like that. But then again, a fast moving civilisation would get the key “early” from their frame, even for astronomical events.
I posit that there is no absolutely reliable delay, but stealth is probably the best practical hedge.
by foota on 7/28/24, 8:50 PM
by bdjsiqoocwk on 7/29/24, 1:02 PM
He's asking "how to decrypt only after a certain date" when in reality he should be asking "how to make information available after a certain date".
by PaulKeeble on 7/28/24, 7:00 PM
by kdkdodiei4 on 7/28/24, 6:28 PM
by a1o on 7/28/24, 6:21 PM
by 0cf8612b2e1e on 7/28/24, 6:38 PM
First key is stored at the center of Olympus Mons on Mars.
by mtremsal on 7/28/24, 6:55 PM
See drand, the distributed randomness beacon protocol at https://drand.love/
by mikewarot on 7/29/24, 2:58 AM
by geekodour on 7/28/24, 6:17 PM
by staplung on 7/28/24, 6:23 PM
by piinbinary on 7/28/24, 6:03 PM
by trabs4t on 7/28/24, 7:23 PM
by eknkc on 7/28/24, 6:17 PM
by aquafox on 7/28/24, 6:09 PM
by _boffin_ on 7/29/24, 4:35 AM