Ryan Castellucci
Ryan Castellucci
> @ryancdotorg One practical reason for preferring larger fields is that the field size limits the number of shares you can generate [...] even so, something like GF(2^64) ought to...
@increasingawareness Here's what I did: https://github.com/ryancdotorg/libsdsock/blob/main/LICENSE I am not a lawyer, etc.
Google's motivation for adding extension order shuffling was to ensure that any servers relying on specific orders (where the ordering is not constrained by standards) would break, similar to GREASE....
ASIC stands for Application Specific Integrated Circuit. In the case of mining ASICs, the application is Bitcoin mining using double sha256. Double sha256 isn't useful in any way for generating...
Not usefully. The bloom filter implementation has a "hash function" that can't address more than 32 bits. It takes advantage of the fact that the input value is already hashed,...
I don't really appreciate the apparent (apologies if I've misread) sarcasm. For the puzzle coins, there is [Pollard's kangaroo algorithm](https://en.wikipedia.org/wiki/Pollard%27s_kangaroo_algorithm), which is faster than brute force. If you want to...
Have you actually tried estimating the expected value of what you're doing? I'm really curious.
"it works on my machine" - I have Ubuntu 20.04. Don't have time to try to troubleshoot it for you.
> logged on every TLS request to an unknown domain I was suggesting a message be logged at `debug` level only, which already has multiple messages for every TLS connection,...
The TTL could be recorded in the cache.