Drunken Bishop (2023)

(re.factorcode.org)

72 points | by todsacerdoti 16 hours ago ago

14 comments

  • GolfPopper 14 hours ago ago

    It's been a while but I can't get past the first image. I keep wanting to kill the orcs and grab all those spellbooks and gems, while keeping a wary eye on the elemental. (Although since this is obviously the Elemental Plane of Air, my ascension kit should let me handle it easily enough.)

  • starry_dynamo 12 hours ago ago

    I love being able to see the keys that are generated.

    Years ago I made a high res greyscale version of the drunken bishop:

    https://raw.githubusercontent.com/justintrupiano/RSA-Randoma...

    • mrjbq7 10 hours ago ago

      That's pretty cool, do you have the algorithm described anywhere?

  • pointlessone 4 hours ago ago

    These visualisations are so bland I can’t tell them apart. I mean, if looking at two side by side than sure, but if I look at them like every other day at best I can’t tell if anything has changed.

  • dtgriscom 12 hours ago ago

    I see the theoretical need for such fingerprint displays, but I can't imagine noticing that the display for one of the computers I work with has changed. Maybe if I printed them all out and posted them around my monitor...

    • ethan_smith 11 hours ago ago

      I've found setting an alias like `alias ssh='ssh -o VisualHostKey=yes'` makes these fingerprints appear on every connection, creating muscle memory for how they should look. When something changes, it immediately feels "off" without needing to remember specific patterns.

      • riffraff 7 hours ago ago

        Why not use ssh's config rather than an alias?

  • jakobnissen 5 hours ago ago

    The visualisation makes it hard to see changes near the end of the string, which makes it a bad visualisation for verifying cryptographic hashes.

    • Thorrez an hour ago ago

      With cryptographic hashes, partial collisions are easier than full collisions, but still difficult.

      But yes, it's unfortunate that Drunken Bishop provides different amounts of protection for bits in different locations. Ideally the protection would be equal among all the bits.

  • bubblebeard 8 hours ago ago

    I am at a loss for words. This is simply an amazing read. Thank you for supplying me with this information.