![]() |
![]() |
#1 |
May 2005
Argentina
2×3×31 Posts |
![]()
I have some questions regarding GIMPS security.
Is the connection between my computer and Primenet encrypted? If not, what prevents someone else sending a double checking with the same residue on the same number without actually checking it? ![]() The other question is what is the purpose of a user password if the browser doesn't encrypt it when I check my statistics... As I don't mind if anyone else reads my statistics I would like to delete my password, does anyone know how I can do that?. ![]() |
![]() |
![]() |
![]() |
#2 |
Jul 2004
Nowhere
80910 Posts |
![]()
needs to be changed in primenet hopefully when v5 comes along....
|
![]() |
![]() |
![]() |
#3 | ||
25×33×11 Posts |
![]() Quote:
Quote:
One could gain undeserved credit to move up on the Top Producers list, but a rapid rise could provoke close scrutiny by other GIMPSters. One could "sabotage" GIMPS LL double-check results with a false confirmation, but if it's just another of the 99.999% of DCs that confirm compositeness, what difference will that make? That exponent was already reported to be composite and will probably get factored sometime in the future anyway. A fake DC report with a nonzero residue that doesn't match the original residue will just provoke a prompt triple-check. (And, of course, submitting a false DC residue of zero will instantly attract high-powered attention and exposure -- we already saw that happen when a false zero residue was _un_intentionally reported!) Suppose an undetected hardware/software error resulted in an erroneous nonzero residue in the original sincere LL, then someone fakes a matching DC with the same erroneous residue? Well ... hmmm .. I guess someday someone will do a correct triple-check and discover the error ... but anyway this could be an actual problem scenario, and it could even conceiveably (at long odds) hide a real Mersenne prime for a long time. Richard "cheesehead" Woods (on vacation) |
||
![]() |
![]() |
#4 |
May 2005
Argentina
2·3·31 Posts |
![]()
And with respect with the password, what's the purpose of the User/Team password?
As far as i know, in a User account anyone accessing his account could stole his credits by changing his name, or merging it with another account. Or I am wrong ![]() That's not tha case in a Team account because the Team name can't be changed that easily (has to email primenet first) So in the Team case I don't see the point of having a password at all, so anyone can join to the team simply by using the Team name. |
![]() |
![]() |
![]() |
#5 | |
"Richard B. Woods"
Aug 2002
Wisconsin USA
22×3×641 Posts |
![]() Quote:
Richard "cheesehead" Woods (on vacation) |
|
![]() |
![]() |
![]() |
#6 |
Aug 2002
Termonfeckin, IE
AD016 Posts |
![]()
Yes, but if someone has access to your network traffic they can see those hidden digits as well.
|
![]() |
![]() |
![]() |
#7 | |
May 2005
Argentina
2×3×31 Posts |
![]()
I thought that the redundant bits send to the server (against mail errors) served also for this purpose. Maybe as some kind of hash or signed as with in public key criptography, and not only as CRC. Isn't that the case?
Quote:
|
|
![]() |
![]() |
![]() |
#8 |
Aug 2002
Termonfeckin, IE
24·173 Posts |
![]()
As far as I can remember the message is sent as binary so it is not as bad as clear text. But a determined hacker could find the hidden digits. I don't think there is any encryption, only CRC.
|
![]() |
![]() |
![]() |
Thread Tools | |
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Unclear Security | Nick | Soap Box | 224 | 2022-10-15 17:20 |
Water security | Nick | Soap Box | 131 | 2021-10-05 07:55 |
security of the webpage? | Unregistered | Information & Answers | 4 | 2013-02-08 04:42 |
Key fob security. | Xyzzy | Science & Technology | 13 | 2007-03-09 02:39 |
A security puzzle | T.Rex | Puzzles | 12 | 2007-02-11 11:54 |