{"id":18267,"date":"2021-02-18T10:05:00","date_gmt":"2021-02-18T10:05:00","guid":{"rendered":"https:\/\/danq.me\/?p=18267"},"modified":"2021-04-14T12:39:49","modified_gmt":"2021-04-14T11:39:49","slug":"basilisk-collection","status":"publish","type":"post","link":"https:\/\/danq.me\/2021\/02\/18\/basilisk-collection\/","title":{"rendered":"Basilisk collection"},"content":{"rendered":"<section class=\"h-cite response p-repost-of \">\n<header>\n<span class=\"p-name\"> <\/span><\/header>\n<blockquote class=\"e-summary\"><\/blockquote>\n<\/section><blockquote class=\"h-cite u-repost-of\" cite=\"https:\/\/suricrasia.online\/unfiction\/basilisk\/\">\n<div class=\"e-content\">\n<h3><a href=\"https:\/\/suricrasia.online\/unfiction\/basilisk\/\">Basilisk collection<\/a><\/h3>\n<p>The <b>basilisk collection<\/b> (also known as the <b>basilisk file<\/b> or <b>basilisk.txt<\/b>) is a collection of over 125 million <a title=\"Proof of work\" href=\"https:\/\/en.wikipedia.org\/wiki\/Proof_of_work#Background\">partial hash inversions<\/a> of the <a class=\"mw-redirect\" title=\"SHA-256\" href=\"https:\/\/en.wikipedia.org\/wiki\/SHA-256\">SHA-256<\/a> <a title=\"Cryptographic hash function\" href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptographic_hash_function\">cryptographic hash function<\/a>. Assuming state-of-the art methods were used to compute the inversions, the entries in the collection collectively represent a <a class=\"mw-redirect\" title=\"Proof-of-work\" href=\"https:\/\/en.wikipedia.org\/wiki\/Proof-of-work\">proof-of-work<\/a> far exceeding the computational capacity of the human race.<sup id=\"cite_ref-calc_1-0\" class=\"reference\"><a href=\"https:\/\/suricrasia.online\/unfiction\/basilisk\/#cite_note-calc-1\">[1]<\/a><\/sup><sup id=\"cite_ref-killed_2-0\" class=\"reference\"><a href=\"https:\/\/suricrasia.online\/unfiction\/basilisk\/#cite_note-killed-2\">[2]<\/a><\/sup> The collection was released in parts through <a title=\"BitTorrent\" href=\"https:\/\/en.wikipedia.org\/wiki\/BitTorrent\">BitTorrent<\/a> beginning in June 2018, although it was not widely reported or discussed until early 2019.<sup id=\"cite_ref-history_3-0\" class=\"reference\"><a href=\"https:\/\/suricrasia.online\/unfiction\/basilisk\/#cite_note-history-3\">[3]<\/a><\/sup> On August 4th, 2019 the complete collection of 125,552,089 known hash inversions was compiled and published by <a title=\"University of Toronto\" href=\"https:\/\/en.wikipedia.org\/wiki\/University_of_Toronto#CryTor\">CryTor<\/a>, the cybersecurity lab of the <a title=\"University of Toronto\" href=\"https:\/\/en.wikipedia.org\/wiki\/University_of_Toronto\">University of Toronto<\/a>.<sup id=\"cite_ref-toronto_4-0\" class=\"reference\"><a href=\"https:\/\/suricrasia.online\/unfiction\/basilisk\/#cite_note-toronto-4\">[4]<\/a><\/sup><\/p>\n<p>The existence of the basilisk collection has had wide reaching consequences in the field of cryptography, and has been blamed for catalyzing the <a title=\"Bitcoin\" href=\"https:\/\/en.wikipedia.org\/wiki\/Bitcoin#Basilisk_crash\">January 2019 Bitcoin crash<\/a>.<sup id=\"cite_ref-killed_2-1\" class=\"reference\"><a href=\"https:\/\/suricrasia.online\/unfiction\/basilisk\/#cite_note-killed-2\">[2]<\/a><\/sup><sup id=\"cite_ref-bitcoin-general_5-0\" class=\"reference\"><a href=\"https:\/\/suricrasia.online\/unfiction\/basilisk\/#cite_note-bitcoin-general-5\">[5]<\/a><\/sup><sup id=\"cite_ref-6\" class=\"reference\"><a href=\"https:\/\/suricrasia.online\/unfiction\/basilisk\/#cite_note-6\">[6]<\/a><\/sup><\/p>\n<p>&hellip;<\/p>\n<p><a title=\"Electronic Frontier Foundation\" href=\"https:\/\/en.wikipedia.org\/wiki\/Electronic_Frontier_Foundation\">Electronic Frontier Foundation<\/a> cryptographer <a class=\"mw-disambig\" title=\"EFF\" href=\"https:\/\/en.wikipedia.org\/wiki\/EFF#Brian_Landlaw\">Brian Landlaw<\/a> has said that &ldquo;whoever made the basilisk is 30 years ahead of the NSA, and the NSA are 30 years ahead of us, so who is there left to trust?&rdquo;<sup id=\"cite_ref-35\" class=\"reference\"><a href=\"https:\/\/suricrasia.online\/unfiction\/basilisk\/#cite_note-35\">[35]<\/a><\/sup><\/p>\n<p>&hellip;<\/p>\n<\/div>\n<footer><cite class=\"p-author h-card\"><a class=\"u-url p-name\" href=\"https:\/\/suricrasia.online\/\">Blackle Mori<\/a><\/cite><\/footer>\n<\/blockquote><p>This is fucking amazing, on a par with e.g. <a href=\"https:\/\/en.wikipedia.org\/wiki\/First_on_the_Moon\"><em>First on the Moon<\/em><\/a>.<\/p><p>Presented in the style of an alternate-reality Wikipedia article, this piece of <a href=\"https:\/\/suricrasia.online\/unfiction\/\">what the author calls &ldquo;unfiction&rdquo;<\/a> describes the narratively believable-but-spooky (if theoretically unlikely from a technical standpoint) 2018 disclosure of evidence for a new presumed mathematical weakness in the <a href=\"https:\/\/en.wikipedia.org\/wiki\/SHA-2\"><abbr class=\"abbr\" title=\"Secure Hash Algorithm 2\">SHA-2<\/abbr><\/a> hash function set. (And if that doesn&rsquo;t sound like a good premise for a story to you, I don&rsquo;t know what&rsquo;s wrong with you! &#128514;)<\/p><p>Cryptographic weaknesses that make feasible attacks on hashing algorithms are <a href=\"https:\/\/www.win.tue.nl\/hashclash\/SoftIntCodeSign\/\">a demonstrably real thing<\/a>. But even with the benefit of the known vulnerabilities in <abbr class=\"abbr\" title=\"Secure Hash Algorithm 2\">SHA-2<\/abbr> (meet-in-the-middle attacks that involve up-to-halving the search space by solving from &ldquo;both ends&rdquo;, plus deterministic weaknesses that make it easier to find two inputs that produce the same hash so long as you choose the inputs carefully) the &ldquo;article&rdquo; correctly states that to produce a long list of hash inversions of the kinds described, that follow a predictable <em>sequence<\/em>, might be expected to require more computer processing power than humans have ever applied to any problem, ever.<\/p><p>As a piece of alternate history science fiction, this piece not only provides a technically-accurate explanation of its premises&hellip; it also does a good job of speculating what the impact on the world would have been of such an event. But my single favourite part of the piece is that it includes what superficially look like genuine examples of what a hypothetical <code>basilisk.txt<\/code> would contain. To do this, the author wrote <a href=\"https:\/\/github.com\/blackle\/Basilisk-Hunter\">a brute force hash finder<\/a> and <a href=\"https:\/\/cybre.space\/@SuricrasiaOnline\/105729046056584612\">ran it for over a year<\/a>. That&rsquo;s some serious dedication. For those that were fooled by this seemingly-convincing evidence of the realism of the piece, here&rsquo;s the actual results of the hash alongside the claimed ones (let this be a reminder to you that it&rsquo;s not sufficient to skim-read your hash comparisons, people!):<\/p><pre style=\"padding-left: 40px;\"><span style=\"text-decoration: underline;\">basilisk:0000000000:ds26ovbJzDwkVWia1tINLJZ2WXEHBvItMZRxHmYhlQd0spuvPXb6cYFJorDKkqlA<\/span>\r\n\r\n<span style=\"text-decoration: underline;\">claimed:<\/span> 00000000000<strong style=\"color: #c00;\">00000000000161b9f84a187cc21b172bf68b3cb3b78<\/strong>684d8e9f17\r\n <span style=\"text-decoration: underline;\">actual:<\/span> 00000000000<strong style=\"color: #c00;\">161b9f84a187cc21b1752bf678bdd4d643c17b3b786<\/strong>684d8e9f17\r\n\r\n<span style=\"text-decoration: underline;\">basilisk:0000000001:dMHUhnoEkmLv8TSE1lnJ7nVIYM8FLYBRtzTiJCM8ziijpTj95MPptu6psZZyLBVA<\/span>\r\n\r\n<span style=\"text-decoration: underline;\">claimed:<\/span> 0000000000<strong style=\"color: #c00;\">000000000000cee5fe5df2d3034fff435bb40e<\/strong>8651a18d69e81460\r\n <span style=\"text-decoration: underline;\">actual:<\/span> 0000000000<strong style=\"color: #c00;\">cee5fe5df2d3034fff435bb4232f21c2efce0e<\/strong>8651a18d69e81460\r\n\r\n<span style=\"text-decoration: underline;\">basilisk:0000000002:aSCZwTSmH9ZtqB5gQ27mcGuKIXrghtYIoMp6aKCLvxhlf1FC5D1sZSi2SjwU9EqK<\/span>\r\n\r\n<span style=\"text-decoration: underline;\">claimed:<\/span> 0000000000<strong style=\"color: #c00;\">00000000000012aabd8d935757db173d5b3e<\/strong>7ae0f25ea4eb775402\r\n <span style=\"text-decoration: underline;\">actual:<\/span> 0000000000<strong style=\"color: #c00;\">12aabd8d935757db173d5b3ec6d38330926f<\/strong>7ae0f25ea4eb775402\r\n\r\n<span style=\"text-decoration: underline;\">basilisk:0000000003:oeocInD9uFwIO2x5u9myS4MKQbFW8Vl1IyqmUXHV3jVen6XCoVtuMbuB1bSDyOvE<\/span>\r\n\r\n<span style=\"text-decoration: underline;\">claimed:<\/span> 0000000000<strong style=\"color: #c00;\">00000000000039d50bb560770d051a3f5a2f<\/strong>e340c99f81e18129d1\r\n <span style=\"text-decoration: underline;\">actual:<\/span> 0000000000<strong style=\"color: #c00;\">39d50bb560770d051a3f5a2ffa2281ac3287<\/strong>e340c99f81e18129d1\r\n\r\n<span style=\"text-decoration: underline;\">basilisk:0000000004:m0EyKprlUmDaW9xvPgYMz2pziEUJEzuy6vsSTlMZO7lVVOYlJgJTcEvh5QVJUVnh<\/span>\r\n\r\n<span style=\"text-decoration: underline;\">claimed:<\/span> 0000000000<strong style=\"color: #c00;\">0000000000002ca8fc4b6396dd5b5bcf5fa8<\/strong>0ea49967da55a8668b\r\n <span style=\"text-decoration: underline;\">actual:<\/span> 0000000000<strong style=\"color: #c00;\">2ca8fc4b6396dd5b5bcf5fa82a867d17ebc4<\/strong>0ea49967da55a8668b<\/pre><p>Anyway: the whole thing is amazing and you should <a href=\"https:\/\/suricrasia.online\/unfiction\/basilisk\/\">go read it<\/a>.<\/p>\n<div class=\"syndication-links\"><\/div>","protected":false},"excerpt":{"rendered":"<section class=\"h-cite response p-repost-of \">\n<header>\n<span class=\"p-name\"> <\/span><\/header>\n<blockquote class=\"e-summary\"><\/blockquote>\n<\/section>\n<p>Blackle Mori&#8217;s &#8220;Basilisk collection&#8221; is an amazing piece of alternate history science fiction, presented in the style of a Wikipedia article. Dan explains why it&#8217;s so good and encourages you to read it.<\/p>\n","protected":false},"author":1,"featured_media":18266,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"mf2_syndication":[],"webmentions_disabled_pings":false,"webmentions_disabled":false},"categories":[3],"tags":[876,216,326,766,272,571],"kind":false,"_links":{"self":[{"href":"https:\/\/danq.me\/_q23j\/wp\/v2\/posts\/18267"}],"collection":[{"href":"https:\/\/danq.me\/_q23j\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/danq.me\/_q23j\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/danq.me\/_q23j\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/danq.me\/_q23j\/wp\/v2\/comments?post=18267"}],"version-history":[{"count":5,"href":"https:\/\/danq.me\/_q23j\/wp\/v2\/posts\/18267\/revisions"}],"predecessor-version":[{"id":18486,"href":"https:\/\/danq.me\/_q23j\/wp\/v2\/posts\/18267\/revisions\/18486"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/danq.me\/_q23j\/wp\/v2\/media\/18266"}],"wp:attachment":[{"href":"https:\/\/danq.me\/_q23j\/wp\/v2\/media?parent=18267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/danq.me\/_q23j\/wp\/v2\/categories?post=18267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/danq.me\/_q23j\/wp\/v2\/tags?post=18267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}