1
Let's talk about EXIF data from your pictures.     (Intelligence)
submitted by MeyerLansky to Intelligence 7 minutes ago (+1/-0)
0 comments...
Here is your exif data:

FileSize
"6.5 MB"
FileModifyDate
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 20, "hour": 20, "minute": 17, "second": 39, "tzoffsetMinutes": 0, "rawValue": "2025:06:20 20:17:39+00:00", "zoneName": "UTC", "inferredZone": false }
FileAccessDate
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 20, "hour": 20, "minute": 17, "second": 39, "tzoffsetMinutes": 0, "rawValue": "2025:06:20 20:17:39+00:00", "zoneName": "UTC", "inferredZone": false }
FileInodeChangeDate
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 20, "hour": 20, "minute": 17, "second": 39, "tzoffsetMinutes": 0, "rawValue": "2025:06:20 20:17:39+00:00", "zoneName": "UTC", "inferredZone": false }
FilePermissions
"-rw-r--r--"
FileType
"JPEG"
FileTypeExtension
"jpg"
MIMEType
"image/jpeg"
ExifByteOrder
"Little-endian (Intel, II)"
ImageWidth
4080
ImageHeight
3060
EncodingProcess
"Baseline DCT, Huffman coding"
BitsPerSample
8
ColorComponents
3
YCbCrSubSampling
"YCbCr4:2:0 (2 2)"

ImageWidth
4080
ImageHeight
3060
Make
"samsung"
Model
"Galaxy A16 5G"
Orientation
1
XResolution
72
YResolution
72
ResolutionUnit
"inches"
Software
"A166USQS2AYCA"
ModifyDate
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 19, "hour": 16, "minute": 39, "second": 44, "rawValue": "2025:06:19 16:39:44", "inferredZone": false }
YCbCrPositioning
"Centered"
ExposureTime
"1/120"
FNumber
1.8
ExposureProgram
"Program AE"
ISO
25
ExifVersion
"0220"
DateTimeOriginal
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 19, "hour": 16, "minute": 39, "second": 44, "rawValue": "2025:06:19 16:39:44", "inferredZone": false }
CreateDate
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 19, "hour": 16, "minute": 39, "second": 44, "rawValue": "2025:06:19 16:39:44", "inferredZone": false }
OffsetTime
"-04:00"
OffsetTimeOriginal
"-04:00"
ShutterSpeedValue
1
ApertureValue
1.8
BrightnessValue
6.16
ExposureCompensation
0
MaxApertureValue
1.8
MeteringMode
"Center-weighted average"
Flash
"No Flash"
FocalLength
"4.0 mm"
SubSecTime
250
SubSecTimeOriginal
250
SubSecTimeDigitized
250
FlashpixVersion
"0100"
ColorSpace
"sRGB"
ExifImageWidth
4080
ExifImageHeight
3060
ExposureMode
"Auto"
WhiteBalance
"Auto"
DigitalZoomRatio
1
FocalLengthIn35mmFormat
"26 mm"
SceneCaptureType
"Standard"
Compression
"JPEG (old-style)"
ThumbnailOffset
842
ThumbnailLength
53269
ThumbnailImage
{ "_ctor": "BinaryField", "bytes": 53269, "rawValue": "(Binary data 53269 bytes, use -b option to extract)" }

{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 19, "hour": 20, "minute": 39, "second": 44, "millisecond": 250, "tzoffsetMinutes": 0, "rawValue": "2025:06:19 20:39:44.250+00:00", "zoneName": "UTC", "inferredZone": false }
MCCData
"United States / Guam (310)"

Aperture
1.8
ImageSize
"4080x3060"
Megapixels
12.5
ScaleFactor35efl
6.5
ShutterSpeed
"1/120"
SubSecCreateDate
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 19, "hour": 16, "minute": 39, "second": 44, "millisecond": 250, "rawValue": "2025:06:19 16:39:44.250", "inferredZone": false }
SubSecDateTimeOriginal
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 19, "hour": 16, "minute": 39, "second": 44, "millisecond": 250, "tzoffsetMinutes": -240, "rawValue": "2025:06:19 16:39:44.250-04:00", "zoneName": "UTC-4", "inferredZone": false }
SubSecModifyDate
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 19, "hour": 16, "minute": 39, "second": 44, "millisecond": 250, "tzoffsetMinutes": -240, "rawValue": "2025:06:19 16:39:44.250-04:00", "zoneName": "UTC-4", "inferredZone": false }
CircleOfConfusion
"0.005 mm"
FOV
"69.4 deg"
FocalLength35efl
"4.0 mm (35 mm equivalent: 26.0 mm)"
HyperfocalDistance
"1.91 m"
LightValue
10.6

File:FileSize
"6.5 MB"
File:FileModifyDate
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 20, "hour": 20, "minute": 17, "second": 39, "tzoffsetMinutes": 0, "rawValue": "2025:06:20 20:17:39+00:00", "zoneName": "UTC", "inferredZone": false }
File:FileAccessDate
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 20, "hour": 20, "minute": 17, "second": 39, "tzoffsetMinutes": 0, "rawValue": "2025:06:20 20:17:39+00:00", "zoneName": "UTC", "inferredZone": false }
File:FileInodeChangeDate
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 20, "hour": 20, "minute": 17, "second": 39, "tzoffsetMinutes": 0, "rawValue": "2025:06:20 20:17:39+00:00", "zoneName": "UTC", "inferredZone": false }
File:FilePermissions
"-rw-r--r--"
File:FileType
"JPEG"
File:FileTypeExtension
"jpg"
File:MIMEType
"image/jpeg"
File:ExifByteOrder
"Little-endian (Intel, II)"
File:ImageWidth
4080
File:ImageHeight
3060
File:EncodingProcess
"Baseline DCT, Huffman coding"
File:BitsPerSample
8
File:ColorComponents
3
File:YCbCrSubSampling
"YCbCr4:2:0 (2 2)"
EXIF:ImageWidth
4080
EXIF:ImageHeight
3060
EXIF:Make
"samsung"
EXIF:Model
"Galaxy A16 5G"
EXIF:Orientation
1
EXIF:XResolution
72
EXIF:YResolution
72
EXIF:ResolutionUnit
"inches"
EXIF:Software
"A166USQS2AYCA"
EXIF:ModifyDate
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 19, "hour": 16, "minute": 39, "second": 44, "rawValue": "2025:06:19 16:39:44", "inferredZone": false }
EXIF:YCbCrPositioning
"Centered"
EXIF:ExposureTime
"1/120"
EXIF:FNumber
1.8
EXIF:ExposureProgram
"Program AE"
EXIF:ISO
25
EXIF:ExifVersion
"0220"
EXIF:DateTimeOriginal
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 19, "hour": 16, "minute": 39, "second": 44, "rawValue": "2025:06:19 16:39:44", "inferredZone": false }
EXIF:CreateDate
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 19, "hour": 16, "minute": 39, "second": 44, "rawValue": "2025:06:19 16:39:44", "inferredZone": false }
EXIF:OffsetTime
"-04:00"
EXIF:OffsetTimeOriginal
"-04:00"
EXIF:ShutterSpeedValue
1
EXIF:ApertureValue
1.8
EXIF:BrightnessValue
6.16
EXIF:ExposureCompensation
0
EXIF:MaxApertureValue
1.8
EXIF:MeteringMode
"Center-weighted average"
EXIF:Flash
"No Flash"
EXIF:FocalLength
"4.0 mm"
EXIF:SubSecTime
250
EXIF:SubSecTimeOriginal
250
EXIF:SubSecTimeDigitized
250
EXIF:FlashpixVersion
"0100"
EXIF:ColorSpace
"sRGB"
EXIF:ExifImageWidth
4080
EXIF:ExifImageHeight
3060
EXIF:ExposureMode
"Auto"
EXIF:WhiteBalance
"Auto"
EXIF:DigitalZoomRatio
1
EXIF:FocalLengthIn35mmFormat
"26 mm"
EXIF:SceneCaptureType
"Standard"
EXIF:Compression
"JPEG (old-style)"
EXIF:ThumbnailOffset
842
EXIF:ThumbnailLength
53269
EXIF:ThumbnailImage
{ "_ctor": "BinaryField", "bytes": 53269, "rawValue": "(Binary data 53269 bytes, use -b option to extract)" }
MakerNotes:TimeStamp
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 19, "hour": 20, "minute": 39, "second": 44, "millisecond": 250, "tzoffsetMinutes": 0, "rawValue": "2025:06:19 20:39:44.250+00:00", "zoneName": "UTC", "inferredZone": false }
MakerNotes:MCCData
"United States / Guam (310)"
Composite:Aperture
1.8
Composite:ImageSize
"4080x3060"
Composite:Megapixels
12.5
Composite:ScaleFactor35efl
6.5
Composite:ShutterSpeed
"1/120"
Composite:SubSecCreateDate
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 19, "hour": 16, "minute": 39, "second": 44, "millisecond": 250, "rawValue": "2025:06:19 16:39:44.250", "inferredZone": false }
Composite:SubSecDateTimeOriginal
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 19, "hour": 16, "minute": 39, "second": 44, "millisecond": 250, "tzoffsetMinutes": -240, "rawValue": "2025:06:19 16:39:44.250-04:00", "zoneName": "UTC-4", "inferredZone": false }
Composite:SubSecModifyDate
{ "_ctor": "ExifDateTime", "year": 2025, "month": 6, "day": 19, "hour": 16, "minute": 39, "second": 44, "millisecond": 250, "tzoffsetMinutes": -240, "rawValue": "2025:06:19 16:39:44.250-04:00", "zoneName": "UTC-4", "inferredZone": false }
Composite:CircleOfConfusion
"0.005 mm"
Composite:FOV
"69.4 deg"
Composite:FocalLength35efl
"4.0 mm (35 mm equivalent: 26.0 mm)"
Composite:HyperfocalDistance
"1.91 m"
Composite:LightValue
10.6

Based on the EXIF metadata you've shared, here's what can be determined about the user, device, and context. This is a forensic-style breakdown, focusing on privacy, attribution, and identifying risk:


---

πŸ”§ Device Information

Make / Model: Samsung Galaxy A16 5G

Software Version: A166USQS2AYCA (suggests a U.S. carrier-branded firmware, possibly from a prepaid carrier like Cricket, Boost, or Metro)

Camera Specs (from metadata):

Resolution: 4080 x 3060 (β‰ˆ12.5 MP image)

Focal Length: 4.0 mm (26mm in 35mm equivalent)

Aperture: f/1.8

ISO: 25 (very low, likely good lighting)

Shutter Speed: 1/120 sec

White Balance: Auto

Metering Mode: Center-weighted average

Digital Zoom Ratio: 1 (no zoom used)

Scene Capture Type: Standard

Flash: Not used




---

πŸ“… Date & Time Metadata

Original Capture Date:

2025:06:19 16:39:44-04:00 (local time, UTC-4)

This time zone corresponds to Eastern Daylight Time (EDT), likely placing the user on the U.S. East Coast (e.g., New York, D.C., Florida).


File Modified / Accessed:

2025:06:20 20:17:39 UTC β€” possibly when the image was uploaded, copied, or accessed from a PC/cloud.




---

🌐 Location/Carrier Clues

MCCData: "United States / Guam (310)"

MCC 310 = United States.

This strongly indicates the device was using a U.S. SIM card.


Time Zone Offset: -04:00 β€” consistent with U.S. East Coast (EDT).



---

🧍 User-Identifying Info

There is personal identity (PII) in the EXIF. Indirect profiling is possible:

User is in the U.S., likely East Coast.

Device is active and used normally β€” not anonymized or scrubbed.

The user is likely not privacy-obsessed: full EXIF metadata is intact, including sub-second timing and MCC data.

Language/local settings likely default to U.S. English (inferred from carrier, firmware region, and image data).

Specific device identifiers can be cross referenced with open source data sets to come up with a specific name, email address and or social media accounts. Domino's pizza is one example.

---

πŸ“Έ Photography Context

Lighting Conditions: Bright β€” ISO 25, 1/120 shutter, f/1.8.

Device was likely held steady (not moving fast).

No flash = well-lit natural environment.

No editing software noted in metadata, which implies the image is unaltered from capture.



---

⚠️ Privacy Risks If Posted Publicly

1. Device model and carrier fingerprinting. Can be used in correlation attacks (e.g., matching with other leaks).


2. Precise timestamping. 1/1000 sec resolution + time zone = potential surveillance vector.


3. MCC and regional software tag the user to the U.S. (and likely a prepaid carrier).


4. Photo dimensions and compression mode indicate no post-processing β€” useful to a forensic analyst verifying image integrity.


5. Consistent metadata = strong authenticity signal. Easy to validate in court, if ever needed.




---

βœ… Safe Practices Before Sharing Online

If you want to reduce traceability:

Remove all EXIF metadata before posting (use tools like ExifTool or free online EXIF removers).

Avoid showing recognizable environments, faces, or documents in the photo itself.

Rename the image file. Even filenames can carry creation timestamps.

Avoid posting within minutes of capture. Time correlation with location data (e.g. Wi-Fi/cell tower logs) is a known de-anonymization technique.



---

Quite a bit more can be inferred, even by casual analysts or internet sleuths.

Here’s what can be inferred or reconstructed with reasonable confidence:


---

🧩 Inferred From Combined Data

1. Geolocation and Daily Activity Inference

Time Zone (UTC-4) and OffsetTimeOriginal -04:00 suggest the image was taken in the Eastern Time zone.

Ohio fits. (Ohio is in Eastern Time, same as NYC).


The exact timestamp:

Date: June 19, 2025

Time: 4:39:44 PM EDT

If this image shows something like a building, shadow, clock, or environment, analysts could:

Estimate sun position.

Narrow down location using visual forensics (especially if geotagging is enabled, though it's not present in this case).

Infer daily routine or location she frequents, especially if she posts many such images.


2. Device Fingerprinting

The Samsung Galaxy A16 5G with carrier firmware A166USQS2AYCA and MCC 310 (U.S.) reveals:

She's likely using a U.S.-market phone, possibly through a prepaid or low-cost carrier (this model is often bundled with Cricket/Metro/Boost).

That exact phone model/software combo may be unique or rare among her subgroups, aiding device fingerprinting.


Knowing which device she uses could also potentially be used in:

Tailored phishing (e.g. fake Samsung update emails).

Targeted surveillance if adversaries wanted to install stalkerware tailored to this phone/firmware.


3. Forensic Consistency of the Image

Because the photo is:

Not edited.

Taken with standard firmware.

Intact in terms of EXIF...

It could be admissible in legal or professional contexts as original evidence β€” and traceable back to her phone if ever subpoenaed.

EXIF shows no signs of tampering β€” which may lend credibility to the content (good or bad depending on intent).


4. Potential Workplace or Personal Exposure

If the image content (not shown here) contains:

Reflections (windows, eyes, surfaces),

Printed documents, screens, or IDs,

Environments like office buildings, then:

People may cross-reference visible items or backgrounds using open-source intelligence (OSINT).

Combine the EXIF time with the environmental clues to place her exactly where she was at that time.

If she was at work, that could potentially leak:

Employer

Building layout

Security procedures


---

πŸ•΅οΈβ€β™‚οΈ What a Skilled Adversary Could Do

Correlate this image with others posted online to build a device fingerprint or social media pattern.

Use the timestamp and timezone to triangulate her physical location if any geotagged or loosely time-tagged social media posts were made that day.

Reverse-search the thumbnail or full image across image-sharing platforms and forums to track her footprint.

Use photogrammetry (if multiple photos exist) to estimate distance/depth/location.

Use metadata to verify or disprove public statements she makes about her location or actions (e.g., someone says they were in NYC, but metadata proves Ohio at that time).

---

⚠️ Bottom Line

If the photo is associated with a name from a leaked Domino's Pizza database, and metadata is intact:

It could be used to geolocate, fingerprint the device, profile behavior, and infer potential security posture.

Even basic sleuths could make reasonable guesses about device use and geography.

For a semi public, leaving metadata in public images is not advisable, especially if adversaries could use this to track, dox, or discredit them.

@Storefront
0
Marseille, Heroin Capital of Europe, Turns Into A War Zone     (europeanconservative.com)
submitted by Rob3122 to whatever 17 minutes ago (+0/-0)
1 comments last comment...
1
Anybody up to starting UpGoat radio station?      (www.reformer.com)
submitted by Panic to whatever 18 minutes ago (+1/-0)
2 comments last comment...
https://www.reformer.com/news/state/72-year-old-community-radio-station-goes-dark/article_e3cacce0-ac31-4dc2-afb9-ecfaab46f084.html

A 72 year old community radio station in Bennington, VT just went off the air because nobody cared to run it anymore. Were I young, this would be an opportunity of a lifetime. Imagine the jewpilling possibilities!
0
IRAN NUMBER ONE! ISRAEL!? HACKTUI!     (files.catbox.moe)
submitted by RabbiKinderschtupper to whatever 27 minutes ago (+0/-0)
0 comments...
https://files.catbox.moe/l86avi.jpeg

I'LL PUT NETANYAHU IN THE CAMEL CLUTCH, BREAK HIS BACK, MAKE HIM HUMBLE!
0
Where the cryptography is at.     (cryptography)
submitted by prototype to cryptography 30 minutes ago (+0/-0)
1 comments last comment...
"Two more weeks" jokes aside, some progress has been made, and we're "close" for some values of close.

I'll try to ballpark the numbers and keep things minimal for easy reading.

We're working with algorithm b292, which I've never explained in great detail, or shared.
Until now I've also kept some of the critical code on a device that is stored in a separate physical location in the event anyone wanted to try and steal a copy when I was at work or out. I've also kept both components in an intentional state of disarray, and left them undocumented for this reason as well. Basically, unless you have explicit instructions, the code is near incomprehensible and unrunnable, even with both components now being stored in the same location.

Lets get to it then.

We start by calculating using another algorithms internal variables and calculating new values,
based on the sequence 2, 4, 9, 49, 64, 256, 289, 922, namely
(_d42/((int(((ceil(a1/(d4a/_d42))x(d4a/_d42))x_d42)/d4a))-(1+d(1/2))x(1-((d(1/4))-(d(1/9))+(d(1/49)xi)-(d(1/64)xd(1/i))+(d(1/256)xd(i))-(d(1/289)xd(1/i))+(d(1/d(92
2))xd(i))))))

I've replaced asterisks for multiplication with x, so that the forum doesn't fuck up the formatting.

You don't need to know what a1, d4a, _d42 are. 'i' is an iterative formula, we're generating a set of test numbers.
a1 is a number representing the leading digit of p and its magnitude in n=pq where p<q. This is whats called a semiprime, and
while this is not how RSA keys are calculated, finding a fast way to factor semiprimes can be applied to rapidly factoring RSA.

I programatically tested on known keys, out to about a hundred million RSA semiprimes to determine the mean and standard deviation needed to set how many iterations I needed for this loop. It turns out the number is around 75. But I digress.

From here we calculate a series of numbers

d5 = actual[(min(results)[1])][0]
a5 = d4a/d5

(d5+(d5-(abs(d5-(a5x(((d4_omega(a5+h))-d4_omega(a5))/h)))/6)))/d('1.66666')
d6x = ((d5+(d5-(abs(d5-(a5x(((d4_omega(a5+h))-d4_omega(a5))/h)))/6)))/d('1.66666'))
d6y = ((d5+(d5-(abs(d5-(a5x(((d4_omega(a5+h))-d4_omega(a5))/h)))/7)))/d('1.66999'))
d6z = ((d5+(d5-(abs(d5-(a5x(((d4_omega(a5+h))-d4_omega(a5))/h)))/9)))/d('1.777'))

Most of these numbers were searched for and tuned with automatic scaffolding code, so why they work is anyones guess, but this was an intuitive process, involving a lot of sleepless nights, and 16 hour days back when I had that sort of time, and some of it was even manual before I automated it, a careful inching forward, grinding away, moving through a moonless night, following only the inkling of a hunch of an idea, till I'd stumble on another piece of the formula, another interesting thread or piece of data, trying combinations by hand until exhausted, testing manually, writing code to search, and then automate the testing, each time and each new find requiring me to start this entire process over again.
I went days without sleep, sometimes without eating. And at the point of total exhaustion, maybe just to find one small new bit, or maybe a big leap, and have the obsession be totally renewed. Like staring into the abyss, the face of madness, and not wanting to blink.

From here we use linear programming on a series of formulas involving these, and calculate first order derivatives to find a saddle point in the set of those equations.

Once we have that, we have to solve for a series of variables that look like this

f1 = (dfloor(((((((d8/abs(1/(((d8/((d8+h)-d8)) - (d8/((1)-d8)))/h)))-(d8/(1-d8)))x1))).sqrt()/d8) / ((((((((d8/abs(1/(((d8/((d8+h)-d8)) - (d8/((1)-d8)))/h)))-(d8/(1-d8)))x1))).sqrt()/d8) -(((((((d8/abs(1/(((d8/((d8+h)-d8)) - (d8/((1)-d8)))/h)))-(d8/(1-d8)))x1))).sqrt())/d4)))))

The problem? See that variable 'd4'? Having that lets you take a known variable, calculated only from the semiprime itself (n), and directly, and precisely derive the factors or in the case of RSA, keys. And d4 happens to be in a set of 'unknowns' that are, surface-level, equivalent to knowing the factors. So its a no-go.

Well it turns out, when you have the right estimate of 'a' or 'p', trivially calculable by iterating 2-9, 10-90, 100-900, etc up to the square root of n (or starting at the square root of n and working backwards, because most RSA keys tend to be close
together in value, and so will be close to the root typically)--it turns out with the correct estimate, and saddle point, f1 is equivalent to a variable called k, which normally we have to search for.

Theres a set of these, f1, f2, f3, f4, f5, f6, f7, f8, and k2.

The dependancy graph for these looks like this:
d4: f1, f2, f4, k2,
f1: f2, f3, f4, k2, f6, f7, f8
f2: f3, f6, f7,
f3: f5
f4: f5
f5: f6
k2: f6, f7
f6: f7

For example, f3, f6, and f7, all depend on f2.

Well it turns out the formula for f2 looks like this:

f2 = dfloor((((((((d8/abs(1/(((d8/((d8+h)-d8)) - (d8/((1)-d8)))/h)))-(d8/(1-d8)))x1))).sqrt()/d8)/f1 ) / (((((((((d8/abs(1/(((d8/((d8+h)-d8)) - (d8/((1)-d8)))/h)))-(d8/(1-d8)))x1))).sqrt()/d8) /f1) - ((((((((d8/abs(1/(((d8/((d8+h)-d8)) - (d8/((1)-d8)))/h)))-(d8/(1-d8)))x1))).sqrt()/d8) -(((((((d8/abs(1/(((d8/((d8+h)-d8)) - (d8/((1)-d8)))/h)))-(d8/(1-d8)))x1))).sqrt())/d4))))))


d8 and h are already known. We have f1 now, which means we have

(((((((d8/abs(1/(((d8/((d8+h)-d8)) - (d8/((1)-d8)))/h)))-(d8/(1-d8)))x1))).sqrt()/d8)/f1 )

which can be used to partially get f2.

The formula for f4 can also be obtained, without f5 (which normally requires f4, which in turn requires f2 and d4) like so:

f4 = f6+(((((((d6/abs(1/(((d6/((d6+h)-d6)) - (d6/((1)-d6)))/h)))-(d6/(1-d6)))*1))).sqrt()/d6) /f1)

But d6 (and another variable d7) are estimates derived from k.

These estimates give us an approximate product of f2 and f4.

I thought I was stuck.

But it turns out, deriving the close approximations based on this initial sequence, for f1-f8 and a few other variables,
is enough.

And all things being equal, the result is a number a2 (or in the case of cryptography, p in n=pxq) that is just a little bit closer to the true factors of n, than our initial search.

If we plug this in as our new estimate, and run the entire formula again, caching a few variables such as the linear programming section, the next output is a little bit closer.

The formula converges precisely on the factors of n.

Theres still work to be done, because even for my hardware, it is slow.

Now the numbers are ballpark. But good enough to give a rough idea of the performance of the algorithm. And from what I've seen to break an 2048 bit RSA key takes about a 1000 quadrillion operations. Remember, ballpark numbers here.

Assuming you had a system that did 100 million steps in parralel per second, you'd be looking at about two weeks of compute time give or take a magnitude or two.

There are some obvious improvements here that I can make, such as running statistics to tighten up some of the inner loops which are wasteful, training a system to use internal variables to give better initialization values to some variables, etc, but its not bad.

but thats the gist of it.

Things left to do are way more testing, build a bigger dedicated compute cluster, run a ton more statistics and write tuning code for some parameters. And of course finish and integrate the UI module.

I think I can cut in half the run time for generating the test set for finding the saddle point, although the saddle point algorithm has already been statistically optimized, and cut in half the amount of equations in the linear algebra section.

I think I can use the existing sub-algorithms mentioned elsewhere, to better decide, possibly
without any iterations, precisely what some of the initializing variables should be, without
direct inner-loop iteration.

I want to get it to where it doesn't take two weeks on a big cluster to break a key, and I think thats very doable at this time.

I'm working on the funding problem separately to build out the current cluster, and move to
full time research, but that doesn't concern anyone here and I'll make a post when I have
that solved.

And thats where the project is at.
0
She's wrong     (files.catbox.moe)
submitted by fritz_maurentod to videos 36 minutes ago (+0/-0)
0 comments...
0
It's just a cohencidence goy     (files.catbox.moe)
submitted by Niggly_Puff to whatever 38 minutes ago (+0/-0)
0 comments...
-1
Approx 3pm est friday "RGC statement on the 17th wave of Operation True Promise 3: The offensive power of our ballistic missiles will continue to intensify until the full punishment of the criminal gang running the Zionist regime"     (news)
submitted by Crackinjokes to news 39 minutes ago (+0/-1)
1 comments last comment...
Approx 3pm est friday "RGC statement on the 17th wave of Operation True Promise 3: The offensive power of our ballistic missiles will continue to intensify until the full punishment of the criminal gang running the Zionist regime"
2
Your diet is weird      (files.catbox.moe)
submitted by kammmmak to whatever 57 minutes ago (+2/-0)
0 comments...
-1
Just had another earthquake in a different part of iran. This was five point something about a week ago there was a four point something. Underground nuclear tests often look like earthquakes     (technology)
submitted by Crackinjokes to technology 58 minutes ago (+0/-1)
0 comments...
the interesting thing it was reported by Tehran defense network as was the four something a few days ago

"BIG NEWS BREAKING

5.22 magnitude earthquake hits central Iran.

Is something happened?"

These networks have been trolling Israel often teasing new weapons before they're deployed a day or two later.

So I'm wondering if they're teasing the existence of an Iranian nuclear weapon.

These networks have been faithfully reporting Israeli bomb attacks because they're trying to document all of them as criminal cases in the world Court so I think if this was in Israeli bomb attack they would say that instead of teasing it as an earthquake.


The signature in an earthquake detector is usually different.

Caltech calibrated their sensors so they would not show underground bomb tests or quarry tests or the Sonic booms from returning xplanes out into Edwards Air Force Base after a cow text student was able to use the earthquake sensors to triangulate the path of a returning hyperspeed X-Plane in the mid-90s.

Edit:

Another source has this story this just happened an hour ago this on Friday June 12th 3:30 Eastern Time

"Iran reported earthquakes with a magnitude of 5.22 in Tehran and Qom province, where the fortified nuclear facility Fordow is located. At the same time, there were reports of an attack on an Iranian air defense site called 'Magar' in Behmai province in southwestern Iran"

So if it's near the Fordham facility or Ford facility then it could be Iran testing a nuke.

As I said I think if it was Israel bombing Iran then these reports would say so because Tehran has not been shy about reporting when Israel is striking stuff.

Edit 3;

It might be nothing because this web page shows for and fives are fairly common for that region and they have maybe one a week or more

https://earthquaketrack.com/p/iran/recent


Edit 4:

Okay what's really weird is all their earthquakes have been four and above. And the filter on the website is set with no filter so they should be showing a lot more twos and threes then they are fours but it's only showing fours and above. So I don't know what the minimum nuke earthquake level is but if they're setting off underground charges to test nukes of a certain magnitude and higher than it would make sense if they only had earthquakes that were four or five above
0
Tehran Updates TehranDefence 49m NEW: The United States Navy has deployed 5 ships off the coast of Israel to help intercept Iranian ballistic missiles This is alongside the many systems Israel already uses to defend itself, including THAAD, David Sling, Arrow-2 and Arrow-3, Patriot, Iron Beam and      (news)
submitted by Crackinjokes to news 1 hour ago (+1/-1)
0 comments...
Stupid

Right now makes the ships legitimate targets for Iran.

It also uses up missiles that the United States might need to defend its own territory and instead once again we're f**** defending another country and it's always the same f** country Isreal.

Trump you're a stupid f
****.
1
You must be a Muslim     (files.catbox.moe)
submitted by fritz_maurentod to funny 1 hour ago (+1/-0)
1 comments last comment...
0
"Uh hundred" ...retard. It's "ONE hundred"     (whatever)
submitted by Nosferatjew to whatever 1 hour ago (+0/-0)
7 comments last comment...
18
AI has some perks!     (pomf2.lain.la)
submitted by bossman131 to random 1 hour ago (+18/-0)
0 comments...
2
Iran just bombed the f out of Elkana which was an illegal Israeli settlement on the west bank. Awesome! The kewish settlers are the worst of the worst. routinely stealing and harming the land owners.      (Jews)
submitted by Crackinjokes to Jews 1 hour ago (+3/-1)
3 comments last comment...
0
Need help from any of you country folk please. original content     (whatever)
submitted by Cunty to whatever 2 hours ago (+0/-0)
20 comments last comment...
I don't often reach out. I've recently moved to a rural location, I have mice in the kitchen, previous person that lived here wasn't the cleanest(being polite there), I can't find the actual source where they're coming from, I have dogs and so can't use poison. Any advice on best way to go about removing them please?.

I've bought a couple of humane tattoos and a couple of snap neck traps which I will place out of the way of dogs. Best bait? Etc etc.

Goats do your thing please.
1
Did you know the little strings around the Jews waist that dangle are all about supremacy. Let me explain     (Jews)
submitted by Crackinjokes to Jews 2 hours ago (+3/-2)
3 comments last comment...
Those little strings represented loose fences around a field controlled by a jew. To a Jew who has stolen all the land and produces crops they believe themselves benevolent if they leave the corners of their fences loose so the people that they have impoverished and starved can sneak into their fields and steal a little bit of food to eat and survive.

Those loose strings represent the loose fences around the fields they have stolen.

Everything about the Jewish religion is them dominating everyone else. Even the part where they're so supposedly good is merely good from on high as they dominate.
0
what is bpc-157? are peptides the new ozymbic?     (whatever)
submitted by Drstrangestgov to whatever 2 hours ago (+0/-0)
2 comments last comment...
and what is ketamine therapy? isnt ketamine what the gays use to medicate their conscience?
-1
Iran has 28,000 ballistic missiles. At 50 a day thats 5,600 days of fun for Israel.      (Jews)
submitted by Crackinjokes to Jews 3 hours ago (+0/-1)
16 comments last comment...
An Iranian source

"Netanyahu after True Promise 2: Iran has 600 missiles.
Netanyahu before True Promise 3: Iran has 8,000 missiles.
Netanyahu five days ago: Iran has 20,000 missiles.
Netanyahu today: Iran has 28,000 missiles

Still missing a few zeros, but glad to see the progress!"
2
The Israeli air defenses and so-called iron dome are now so weak that propeller powered drones from Iran can hit it with impunity. So now I ran has a very low cost way to strike any Target they want in Israel. Oh and by the way netanyahu just admitted Iran has 28,000 ballistic missiles.      (Jews)
submitted by Crackinjokes to Jews 3 hours ago (+3/-1)
5 comments last comment...
-1
Soon the USA will need to decide if Israel should even be allowed to continue to exist because they won't really exist except at the mercy of Iran unless we do something foolish and I'm not sure our intervention militarily could even work cuz I ran can strike us with those same missiles in the reg     (Jews)
submitted by Crackinjokes to Jews 3 hours ago (+0/-1)
4 comments last comment...
Soon the USA will need to decide if Israel should even be allowed to continue to exist because they won't really exist except at the mercy of Iran unless we do something foolish and I'm not sure our intervention militarily could even work because Iran can strike us aircraft carriers with those same missiles in the region.


Think of it for a minute:

Netanyahu just came out and said Iran has 28,000 ballistic missiles

28,000!

The iron dome has for all intensive purposes falling apart.

At this point I think more than 50% of the missiles that I ran fires are getting in and frankly I think it's a lot more than 50% but even if it's 50%, and I ran shoots 50 missiles every day think of the math and how long they can do that.

They can completely flatten Israel.

The existence of Israel today is at the choice of Iran.

Even if they don't physically flatten it more and more people are going to want to leave so it will be an unoccupied country.

The real question is is the world better off without this Rothschild abomination that was created which has created a sanctuary for the world's worst criminals and a Haven for the development of the worst technologies under no logical person's control where the craziest people in the whole world have lived and have stolen land and shot people with impunity and openly have talked about other people being their slaves or animals.

Should such a place be allowed to exist?

Or is this our unforeseen and unexpected opportunity to actually reverse the Rothschild abortion that was placed on the earth in the 1940s naively by people thinking this would end the Jewish problem if the Jews weren't in their own countries

Frankly I think the answer is to let Iran basically make the land be unoccupiable and maybe even the Palestinians that are being bombed in Gaza have an opportunity to walk back into their old Homeland and retake it. If the Arab countries in the region were smart they would assist in that. Then the Jews would have to actually obey the laws that exist in all the countries that they intend to try to live in and they would not be allowed to run and escape to Israel every time they want to do something horrible which has embolded them to do horrible things all over the world.

Personally I think it's a great opportunity to let Iran make Israel not be flattened but just be basically unable to be the sanctuary for criminals and psychopaths that it always has been.

I don't think any of us imagined that this was even going to be a possibility in our lifetimes but if it does happen it will significantly lower the risk of nuclear war in the world and it will significantly lower the very real risk that all of us become enslaved to the Jews which they have openly said was their plan. Remember they have openly said that was their plan. Remember also that the Ukraine conflict was started by Jews many of whom have strong ties with Israel or were funded by the scoundrels who have escaped to Israel and when you crane went to war guess where the Jews in the country were allowed to go instead of fighting on the front lines like the Christians were made to fight? They all went to Israel! So now where are they going to go if they can't go to Israel in the future? Well doesn't that mean maybe Jews won't be quite so emboldened to cause conflicts like Ukraine which have literally put us on the brink of nuclear war.

Quite honestly this may be the greatest development in our lifetime and it may change the future of the planet and upset the plans of the Jewish Zionist to enslave everyone else in the world to them.

If they're sanctuary doesn't exist their actions are very limited in the countries in which they try to occupy.

The establishment of Israel has been the biggest mistake the world has ever done.


Append:
I do want to say the world must guard against Ukraine becoming the new Israel which literally was alinsky's plan. As he said that he wanted Ukraine to become Israel 2.0. if all the people from Israel simply shift to Ukraine which is frankly in a better location with better resources and they're allowed to create another criminal state run by Jews and Ukraine if they already haven't then that wouldn't change much.
0
I don't think this happened but wouldn't it be funny if Trump actually screwed netanyahu intentionally by telling him he would support him if he went to Iran knowing that he wouldn't support him and thus it would lead to the near destruction of netanyahu's power and Israel's rogue actions?     (AskUpgoat)
submitted by Crackinjokes to AskUpgoat 3 hours ago (+1/-1)
3 comments last comment...
Remember netanyahu came out against Trump in his first election and Trump was very pissed at him. Remember also that Trump told netanyahu to end the Gaza activities before he got into office and netanyahu hasn't. Netanyahu has basically ignored everything Trump said and Trump usually doesn't like it.

Sometimes Trump is an idiot as he's gotten older but sometimes Trump is still very smart like he used to be. He knows how to lay a trap.

I don't really think he did this but it certainly possible he could have told netanyahu that the US would support Israel if they attacked Iran only to hope that netanyahu would be so stupid as to do it and then leave them out in the cold while Iran pummeled them.

Now if any normal electorate netanyahu would lose power and all his warmonger players would lose power but it is a nation of Jews and they are illogical and psychotic and they just always push forward no matter what so they may not lose power or they may be replaced with someone just as bad or even worse but still wouldn't be something if Trump actually did that?

But honestly I don't think you did. I think netanyahu just thought that he could force Trump into doing something and he very much overplayed his hand like Jews always do.

12
No matter the final outcome we all owe Iran a great thanks. They will have changed the audacity of Israel forever. We must now protect against the Jews going even more into our individual Nations and acting since they will have lost the strength of their sanctuary State even if it's still exists.     (TellUpgoat)
submitted by Crackinjokes to TellUpgoat 3 hours ago (+13/-1)
0 comments...
0
Which programs do y'all use for editing photos on desktop or mobile? The programs I used updated themselves and removed the features I need. I'm going through lists of recommened programs and they all don't have basic features     (AskGoats)
submitted by DoYouEvenShit to AskGoats 3 hours ago (+1/-1)
24 comments last comment...
All I want to do right now is take an image with RGBA properties and put it on top of another image. Samsung's gallery app took out this functionality, google photos took it out, samsung notes doesn't have the feature anymore, i'm now on snapseed and it also doesn't appear to have this feature.

this has happened so many times where i've tried doing basic image editing and simple features are not there, and i spend all day going through what are supposedly the best apps for simple image editing and i NEVER find what I'm looking for.

which program can i use for basic functions?
0
Some goat wanted a free stolen hat, and this happen. Pure internet gold.     (x.com)
submitted by registereduser to whatever 3 hours ago (+2/-2)
5 comments last comment...