Bitcoin Forum

Other => Off-topic => Topic started by: nullius on February 17, 2018, 08:04:14 AM



Title: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 08:04:14 AM
[Note:  One of my motives which led to my unlucky assocation with Alia (https://bitcointalk.org/index.php?topic=3032057.msg31217052#msg31217052) was my desire for someone to work with for an erotic Bitcoin art project.  For now, I will leave my intentions a mystery; but girls who have really gone Bitcoin should feel free to contact me if curious.  Moreover, I will revive and continue this thread if/when I have suitable other(s) with whom to make cryptolove.  For I believe in the virtue of Ciphersex (https://bitcointalk.org/index.php?topic=3062006.msg31817506#msg31817506), q.v. — nullius, 2018-03-08]



I’m here with the lovely Alia (https://bitcointalk.org/index.php?action=profile;u=1764044).  In case you don’t yet know who she is, Alia is the saucy lass who posted this two days after signing up for the forum:

I think I'm an outlier. If I have 100 merit in 30 days, I'll eat all my words and post a vid of me masturbating to a merit infographic

Whereupon I wrote her an open letter (https://bitcointalk.org/index.php?topic=2846629.msg30424698#msg30424698).  We hit it off.

Alia is enthusiastic about cryptography, a subject about which I myself am passionate in every sense:  I am thrilled by the touch of numbers, the look of elliptic curves, the scent of algorithms in rut, the sound of exponential moaning, and most of all, the taste of Alia’s own private cipher.  I offered to educate her:

Of course, I’d be happy to help you increase your technical knowledge.  I’ve spent plenty of my time doing that for people who are far less—charming.  When you see what secp256k1 (https://bitcointalk.org/index.php?topic=2859033.msg29345381#msg29345381) looks like, you’ll understand my remark about your elliptic curves:


(N.b., that’s the same equation over the real numbers, and not over a finite field as the crypto actually works. https://en.bitcoin.it/wiki/Secp256k1  Nevertheless, it’s fun.)

What is your knowledge level of cryptography concepts?  E.g., could you explain in basic (non-mathematical) terms how the ciphersuites in PGP, TLS, etc. fit together?  Symmetric cipher, asymmetric cipher, hash function, etc.  Also, concepts such as the distinctions between integrity, confidentiality, and authentication.

I can teach you all these things, and much more.  I am looking for the starting point.

Now, how better do you learn?  In my lap, or on your knees with your head betwixt my legs?  I should mention, “in my lap” involves penetration.  Penetrating insights into your most private cipher.

P.S., if I can’t make you cum whilst instructing you on ciphersuites, then I will have failed as a teacher.

P.P.S., I do like helping others.  Do you want to take this show public with a “NSFW”-marked cryptography instruction thread in Off-Topic, or would you prefer to keep this between us?  Perhaps this could drive you business.

Now, how better do you learn?  In my lap, or on your knees with your head betwixt my legs?  I should mention, “in my lap” involves penetration.  Penetrating insights into your most private cipher.

The second one please  ::)

P.S., if I can’t make you cum whilst instructing you on ciphersuites, then I will have failed as a teacher.

Lmfao.

P.P.S., I do like helping others.  Do you want to take this show public with a “NSFW”-marked cryptography instruction thread in Off-Topic, or would you prefer to keep this between us?  Perhaps this could drive you business.

Let's do it; hopefully everyone can benefit from it

P.P.S., I do like helping others.  Do you want to take this show public with a “NSFW”-marked cryptography instruction thread in Off-Topic, or would you prefer to keep this between us?  Perhaps this could drive you business.

Let's do it; hopefully everyone can benefit from it

Do you mind if I copypaste from some of our PMs thus far, to get the thread rolling?  Privacy of private communication is sacred to me (excepting scammers, threats etc.)  Thus, I would not do so without express agreement.

Whereupon, I will start writing a didactic orgasm for you.

Perfectly fine by me, you have my enthusiastic permission to reveal all of our shared secrets

Welcome thus to Ciphersex 101.



N.b., this thread is self-moderated.  I will delete posts which are disrespectful of Alia and/or myself.  I will delete posts I simply dislike.  I will delete whatever I want to.  Keep it sexy, or don’t even try posting here.


Title: Re: Ciphersex 101 [NSFW]
Post by: alia on February 17, 2018, 08:06:18 AM
This man is a god. I hope he can bring all of us multiple didactic orgasms


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 08:08:23 AM
Hello, Alia.  Now as I hold you in my lap and press myself against your entrance, I will teach you to authenticate my cock using public-key cryptography and a hash.


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 08:11:01 AM
First, let’s get our concepts straight:

  • Authentication:  You want to be sure it’s really me down there, and not an imposter.
  • Integrity:  You want to be sure that our coital connection is not tampered with by a “Man in the Middle” attacker.
  • Confidentiality:  You want to be sure that nobody is watching our activities here.  Oops.


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 08:14:08 AM
Authentication:  You want to be sure it’s really me down there, and not an imposter.

You will require me to digitally sign my cock before inserting it into you.  I will use my private key to create this signature; and you will use my public key to verify it.  Note:  This is also how Bitcoin transactions are verified.  (Yes, all Bitcoin transactions involve my cock.)


Title: Re: Ciphersex 101 [NSFW]
Post by: alia on February 17, 2018, 08:18:13 AM
First, let’s get our concepts straight:

  • Authentication:  You want to be sure it’s really me down there, and not an imposter.
  • Integrity:  You want to be sure that our coital connection is not tampered with by a “Man in the Middle” attacker.
  • Confidentiality:  You want to be sure that nobody is watching our activities here.  Oops.

Loving this already. I guess a threesome is out of the question


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 08:19:09 AM
Loving this already. I guess a threesome is out of the question

Secure multiparty computation?  We’ll get to that...


Title: Re: Ciphersex 101 [NSFW]
Post by: TMAN on February 17, 2018, 08:22:53 AM
Loving this already. I guess a threesome is out of the question

Secure multiparty computation?  We’ll get to that...

I'm down for some 3 of 5 multi sig if alia brings some friends..


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 08:24:10 AM
  • Integrity:  You want to be sure that our coital connection is not tampered with by a “Man in the Middle” attacker.

We will use a MAC (Message Authentication Code) to assure the integrity of all fluids exchanged.  One common example of a MAC is HMAC using a hash such as SHA-256.  HMAC is a special means of hashing together a shared secret with sexual libations a message, such that the fluids message cannot be forged by someone who knows the key.

(P.S., I meant what I said about the taste of your cipher.)


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 08:28:54 AM
Confidentiality:  You want to be sure that nobody is watching our activities here.  Oops.

Well, I guess that ship has sailed.

But if we wanted to keep this carnal conversation confidential, we would encrypt it using a symmetric cipher (same key to encrypt and decrypt).  Depending on the protocol, we would either use a key agreement algorithm to establish a shared secret key across an insecure channel, as in the TLS used by your web browser (for decent ciphersuites)—or use or public keys to encrypt the symmetric key, as in PGP.

Now, which protocol are we using at present?  With you grinding in my lap, methinks the appropriate protocol is slow, deep, and hard.


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 08:38:15 AM
I will presume that Alia needed a masturbation break.  For this class in applied cryptography, that is called “homework”.


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 08:44:59 AM
I'm down for some 3 of 5 multi sig if alia brings some friends..

Well, Alia?  In Bitcoin multisig, we’re still talking ECC.  Have you any friends whose elliptic curves could have their public points (a/k/a “nipples”) hashed together with yours?  As Segwit fans, this will involve Pay to Witness Script Hash.  That’s more secure (https://bitcoincore.org/en/2016/01/26/segwit-benefits/#increased-security-for-multisig-via-pay-to-script-hash-p2sh):  A 128-bit security level rather than an 80-bit security level in old P2SH, in case any of your friends turns out to be a malicious signer.  Also, because people are witnessing this.

(With a thread like this, I also wonder if she’s looking for a pseudorandom gang-bang.  To use technical terminology.)


Title: Re: Ciphersex 101 [NSFW]
Post by: alia on February 17, 2018, 08:59:48 AM
I will presume that Alia needed a masturbation break.  For this class in applied cryptography, that is called “homework”.

Funny because that's actually what I just did


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 09:02:42 AM
I will presume that Alia needed a masturbation break.  For this class in applied cryptography, that is called “homework”.

Funny because that's actually what I just did

Good girl.  I hope you got good avalanche effect.  (Will explain what that means...)


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 09:12:40 AM
I will presume that Alia needed a masturbation break.  For this class in applied cryptography, that is called “homework”.

Funny because that's actually what I just did

Good girl.  I hope you got good avalanche effect.  (Will explain what that means...)

Consider a hash function, such as the SHA-256 algorithm used by Bitcoin in many places.  Among other properties, a cryptographically secure hash has the property that for any 1-bit change in the input, on average, 50% of the output bits flip.  See how this works:

Code:
user@host:~$ echo -n 'b' | sha256sum 
3e23e8160039594a33894f6564e1b1348bbd7a0088d42c4acb73eeaed59c009d  -
user@host:~$ echo -n 'c' | sha256sum
2e7d2c03a9507ae265ecf5b5356885a53393a2029d241394997265a1a25aefc6  -

I have here chosen 'b' and 'c' for the sake of example, because ASCII 'b' (0x62) is one bit different than 'c' (0x63).  ('a' (0x61) and 'b' (0x62) differ in 2 bits.  Well, that’s another lesson.)

Thus, as you felt the caress of my words and imagined my cock in your hot, wet cipher, every 1-bit of thrust between us should have made you feel half-scrambled with ecstasy.

Was that explanation sufficiently clear, or do I need to somehow involve a spanking?  I know you like that; and I may need to apply such measures, if you fall behind in this lesson.


Title: Re: Ciphersex 101 [NSFW]
Post by: alia on February 17, 2018, 09:18:58 AM
I will presume that Alia needed a masturbation break.  For this class in applied cryptography, that is called “homework”.

Funny because that's actually what I just did

Good girl.  I hope you got good avalanche effect.  (Will explain what that means...)

Consider a hash function, such as the SHA-256 algorithm used by Bitcoin in many places.  Among other properties, a cryptographically secure hash has the property that for any 1-bit change in the input, on average, 50% of the output bits flip.  See how this works:

Code:
user@host:~$ echo -n 'b' | sha256sum 
3e23e8160039594a33894f6564e1b1348bbd7a0088d42c4acb73eeaed59c009d  -
user@host:~$ echo -n 'c' | sha256sum
2e7d2c03a9507ae265ecf5b5356885a53393a2029d241394997265a1a25aefc6  -

I have here chosen 'b' and 'c' for the sake of example, because ASCII 'b' (0x62) is one bit different than 'c' (0x63).  ('a' (0x61) and 'b' (0x62) differ in 2 bits.  Well, that’s another lesson.)

Thus, as you felt the caress of my words and imagined my cock in your hot, wet cipher, every 1-bit of thrust between us should have made you feel half-scrambled with ecstasy.

Was that explanation sufficiently clear, or do I need to somehow involve a spanking?  I know you like that; and I may need to apply such measures, if you fall behind in this lesson.

So, this implies that it's very hard to crack a private key, right? Am I understanding it correctly?


Title: Re: Ciphersex 101 [NSFW]
Post by: alia on February 17, 2018, 09:19:34 AM
I'm down for some 3 of 5 multi sig if alia brings some friends..

Well, Alia?  In Bitcoin multisig, we’re still talking ECC.  Have you any friends whose elliptic curves could have their public points (a/k/a “nipples”) hashed together with yours?  As Segwit fans, this will involve Pay to Witness Script Hash.  That’s more secure (https://bitcoincore.org/en/2016/01/26/segwit-benefits/#increased-security-for-multisig-via-pay-to-script-hash-p2sh):  A 128-bit security level rather than an 80-bit security level in old P2SH, in case any of your friends turns out to be a malicious signer.  Also, because people are witnessing this.

(With a thread like this, I also wonder if she’s looking for a pseudorandom gang-bang.  To use technical terminology.)

I think I'm losing you here. What exactly is an elliptic curve?


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 09:22:59 AM
Consider a hash function, such as the SHA-256 algorithm used by Bitcoin in many places.  Among other properties, a cryptographically secure hash has the property that for any 1-bit change in the input, on average, 50% of the output bits flip.  See how this works:

[...]

Was that explanation sufficiently clear, or do I need to somehow involve a spanking?  I know you like that; and I may need to apply such measures, if you fall behind in this lesson.

So, this implies that it's very hard to crack a private key, right? Am I understanding it correctly?

No, a hash function does not involve any private keys.  I will now briefly explain the most common types of cryptographic algorithms, and their purposes...

(Get back in my lap, and give a good grind with me in you.  You don’t deserve a spanking, because I omitted the prerequisite background information.)


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 09:25:18 AM
Let’s start with the basics.  We’ll get to elliptic curves, after I fondle yours for awhile while giving a conceptual overview of public-key crypto, symmetric crypto, hash functions, etc.

Also, I have changed my mind about the spanking.  I will spank you just for fun.



Public-key ciphers

A public-key cipher uses two different keys:  A public key which is not secret (as the name implies), and a private key (also sometimes called the secret key).  These two respective keys are related by a mathematical function which lets messages encrypted to the public key be decrypted by the private key; also, by similar means, the private key can produce forgery-resistant digital signatures which can be verified using the public key.

The advantage of a public-key cipher is that the public key can be—well, it can be made public.

Bitcoin uses an elliptic-curve cryptography (ECC) cipher with curve parameters called “secp256k1”.  Remember what I said about the mathematical function which relates the public key to the private key.  Here, the function is based on something called the elliptic curve discrete logarithm problem (ECDLP).  Don’t worry about what that is right now.

A typical Bitcoin transaction must be bear a verifiable digital signature from a private key.  The corresponding public key is the basis for the type of Bitcoin address with which most users interact:  Old P2PKH (Pay To Public Key Hash; addresses starting with a “1”), or with Segwit, P2WPKH (Pay To Witness Public Key Hash).  The public key is not used directly to form the address:  Rather, it is hashed, and the hash of the public key (plus metadata) makes your Bitcoin address.

Symmetric ciphers

A symmetric cipher uses the same key for both encryption and decryption.  Obviously, this key must be kept secret!  The most commonly used symmetric cipher today is AES; you have probably heard of that.

Hashes

A hash is a one-way compression function which takes an arbitrary-length input, and produces therefrom a fixed-length output.  Take for example the SHA-256 function.  You can feed into it any arbitrary amount of sexy bits and love-bytes; and its output will always be 256 bits (that is, 32 bytes (that is more precisely, 32 octets)).

There are many types of hash functions used for different purposes in computer science.  Many, if not most hash functions are unsuitable for cryptography.  A cryptographically secure hash function must have certain properties which make it infeasible for attackers to do such things as finding two different inputs which produce the same arbitrary hash (called a collision), or finding an input which produces a certain particular hash (called a preimage attack).

I believe I do not exaggerate when I say that hashes are the single most important building block of Bitcoin.  Hashes are everywhere!  They are used to build the Merkle trees which tie together all the substantive contents of a block; they are used to produce a Merkle chain of one block to the next, i.e. this “blockchain” thing you keep hearing about; a partial preimage attack is the basis of block generation, a/k/a mining...


Title: Re: Ciphersex 101 [NSFW]
Post by: actmyname on February 17, 2018, 10:17:52 AM
lol nullius you've done it again


Title: Re: Ciphersex 101 [NSFW]
Post by: alia on February 17, 2018, 10:58:08 AM
Let’s start with the basics.  We’ll get to elliptic curves, after I fondle yours for awhile while giving a conceptual overview of public-key crypto, symmetric crypto, hash functions, etc.

Also, I have changed my mind about the spanking.  I will spank you just for fun.



Public-key ciphers

A public-key cipher uses two different keys:  A public key which is not secret (as the name implies), and a private key (also sometimes called the secret key).  These two respective keys are related by a mathematical function which lets messages encrypted to the public key be decrypted by the private key; also, by similar means, the private key can produce forgery-resistant digital signatures which can be verified using the public key.

The advantage of a public-key cipher is that the public key can be—well, it can be made public.

Bitcoin uses an elliptic-curve cryptography (ECC) cipher with curve parameters called “secp256k1”.  Remember what I said about the mathematical function which relates the public key to the private key.  Here, the function is based on something called the elliptic curve discrete logarithm problem (ECDLP).  Don’t worry about what that is right now.

A typical Bitcoin transaction must be bear a verifiable digital signature from a private key.  The corresponding public key is the basis for the type of Bitcoin address with which most users interact:  Old P2PKH (Pay To Public Key Hash; addresses starting with a “1”), or with Segwit, P2WPKH (Pay To Witness Public Key Hash).  The public key is not used directly to form the address:  Rather, it is hashed, and the hash of the public key (plus metadata) makes your Bitcoin address.

Symmetric ciphers

A symmetric cipher uses the same key for both encryption and decryption.  Obviously, this key must be kept secret!  The most commonly used symmetric cipher today is AES; you have probably heard of that.

Hashes

A hash is a one-way compression function which takes an arbitrary-length input, and produces therefrom a fixed-length output.  Take for example the SHA-256 function.  You can feed into it any arbitrary amount of sexy bits and love-bytes; and its output will always be 256 bits (that is, 32 bytes (that is more precisely, 32 octets)).

There are many types of hash functions used for different purposes in computer science.  Many, if not most hash functions are unsuitable for cryptography.  A cryptographically secure hash function must have certain properties which make it infeasible for attackers to do such things as finding two different inputs which produce the same arbitrary hash (called a collision), or finding an input which produces a certain particular hash (called a preimage attack).

I believe I do not exaggerate when I say that hashes are the single most important building block of Bitcoin.  Hashes are everywhere!  They are used to build the Merkle trees which tie together all the substantive contents of a block; they are used to produce a Merkle chain of one block to the next, i.e. this “blockchain” thing you keep hearing about; a partial preimage attack is the basis of block generation, a/k/a mining...

Thanks! I'll be back in a few hours, looking forward to you exploring deeper depths of my cipher with all of your keys (start with public and end with private, please)


Title: Re: Ciphersex 101 [NSFW]
Post by: o_e_l_e_o on February 17, 2018, 12:00:55 PM
This is better than Shakespeare.


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 12:32:29 PM
Thanks! I'll be back in a few hours, looking forward to you exploring deeper depths of my cipher with all of your keys (start with public and end with private, please)

The key between my legs shall decrypt the cipher betwixt yours, o Alia.

Till then, your homework is to solemnly contemplate how many readers are pleasuring themselves whilst watching you learn the basics of applied cryptography.  Protip:  Kerckhoffs’ Principle states that the security of a cryptosystem must rely solely on the secrecy of the secret key; whereas the cipher may be known to all.  Published in papers.  Released on the Internet.

My key is secret:  There are no (unencrypted) photos of it on the Internet.  Whereas your cipher is quite public, is it not, my dear exhibitionist meretrix?  Does the thought thrill you?  I know it does, but please do say.  I’m not the only one who wants to hear it.  How much do you enjoy Kerckoffs’ Principle, as applied to you?

Aside—I noticed you advertise some kink.  The security of the Bitcoin mining system (based on Hashcash) relies on something called a partial preimage bruteforce attack.  We’ll get to that later, if you’re naughty.  Also, if you’re nice.


This is better than Shakespeare.

Oh, really?  Have you forgotten Shakespeare’s evident taste for the taste of a woman’s cipher?

Quote from: William Shakespeare
Hamlet: Lady, shall I lie in your lap?

Lying down at OPHELIA's feet

Ophelia: No, my lord.

Hamlet: I mean, my head upon your lap?

Ophelia: Ay, my lord.

Hamlet: Do you think I meant country matters?

Ophelia: I think nothing, my lord.

Hamlet: That's a fair thought to lie between maids’ legs.

...or...

Quote from: William Shakespeare
“Fondling,” she saith, “since I have hemm’d thee here
Within the circuit of this ivory pale,
I’ll be a park, and thou shalt be my deer;
Feed where thou wilt, on mountain or in dale:
   Graze on my lips, and if those hills be dry,
   Stray lower, where the pleasant fountains lie.

Etc...  There is plenty of sexy Shakespeare scattered about.  Oh, and Alia, I hope that gives you some idea of what I plan to do to you.


Title: Re: Ciphersex 101 [NSFW]
Post by: alia on February 17, 2018, 01:13:57 PM
Thanks! I'll be back in a few hours, looking forward to you exploring deeper depths of my cipher with all of your keys (start with public and end with private, please)

The key between my legs shall decrypt the cipher betwixt yours, o Alia.

Till then, your homework is to solemnly contemplate how many readers are pleasuring themselves whilst watching you learn the basics of applied cryptography.  Protip:  Kerckhoffs’ Principle states that the security of a cryptosystem must rely solely on the secrecy of the secret key; whereas the cipher may be known to all.  Published in papers.  Released on the Internet.

My key is secret:  There are no (unencrypted) photos of it on the Internet.  Whereas your cipher is quite public, is it not, my dear exhibitionist meretrix?  Does the thought thrill you?  I know it does, but please do say.  I’m not the only one who wants to hear it.  How much do you enjoy Kerckoffs’ Principle, as applied to you?

Aside—I noticed you advertise some kink.  The security of the Bitcoin mining system (based on Hashcash) relies on something called a partial preimage bruteforce attack.  We’ll get to that later, if you’re naughty.  Also, if you’re nice.


This is better than Shakespeare.

Oh, really?  Have you forgotten Shakespeare’s evident taste for the taste of a woman’s cipher?

Quote from: William Shakespeare
Hamlet: Lady, shall I lie in your lap?

Lying down at OPHELIA's feet

Ophelia: No, my lord.

Hamlet: I mean, my head upon your lap?

Ophelia: Ay, my lord.

Hamlet: Do you think I meant country matters?

Ophelia: I think nothing, my lord.

Hamlet: That's a fair thought to lie between maids’ legs.

...or...

Quote from: William Shakespeare
“Fondling,” she saith, “since I have hemm’d thee here
Within the circuit of this ivory pale,
I’ll be a park, and thou shalt be my deer;
Feed where thou wilt, on mountain or in dale:
   Graze on my lips, and if those hills be dry,
   Stray lower, where the pleasant fountains lie.

Etc...  There is plenty of sexy Shakespeare scattered about.  Oh, and Alia, I hope that gives you some idea of what I plan to do to you.

Can't wait to receive transactions from you hard and fast. And in nine months, maybe we'll have a new multisig wallet.


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 01:48:27 PM
Can't wait to receive transactions from you hard and fast. And in nine months, maybe we'll have a new multisig wallet.

Well, there’s something which will grow in value.

Now that you’ve got me hard, and I mean NP-COMPLETE hard, I want for you to wrap those luscious legs of yours around me for a horizontal dance as I fill you up with me.  Let’s establish a rhythm with my continuing description of hash functions...


Title: Re: Ciphersex 101 [NSFW]
Post by: alia on February 17, 2018, 01:59:21 PM
Can't wait to receive transactions from you hard and fast. And in nine months, maybe we'll have a new multisig wallet.

Well, there’s something which will grow in value.

Now that you’ve got me hard, and I mean NP-COMPLETE hard, I want for you to wrap those luscious legs of yours around me for a horizontal dance as I fill you up with me.  Let’s establish a rhythm with my continuing description of hash functions...

Bitcoin talk aside, you're actually making me really horny xD


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 02:07:53 PM
Bitcoin talk aside, you're actually making me really horny xD

Well, fair’s fair.  You’re doing the same to me.

I suggest a solution—old joke, not my original:  Let’s add you plus me, subtract our clothes, divide your legs, and multiply.


Title: Re: Ciphersex 101 [NSFW]
Post by: alia on February 17, 2018, 02:12:54 PM
Bitcoin talk aside, you're actually making me really horny xD

Well, fair’s fair.  You’re doing the same to me.

I suggest a solution—old joke, not my original:  Let’s add you plus me, subtract our clothes, divide your legs, and multiply.

Mathematically sound logic. Guess we have to do it: you know what they say, code is law!


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 02:18:43 PM
I suggest a solution—old joke, not my original:  Let’s add you plus me, subtract our clothes, divide your legs, and multiply.

Mathematically sound logic. Guess we have to do it: you know what they say, code is law!

Spread ’em, and I’ll kiss your law right now.  I know that’s the code which rules you—Alia.


Title: Re: Ciphersex 101 [NSFW]
Post by: alia on February 17, 2018, 02:20:16 PM
I suggest a solution—old joke, not my original:  Let’s add you plus me, subtract our clothes, divide your legs, and multiply.

Mathematically sound logic. Guess we have to do it: you know what they say, code is law!

Spread ’em, and I’ll kiss your law right now.  I know that’s the code which rules you—Alia.

Oh nullius, you're the only man who holds the password to my admin console. Now decrypt my cipher and let's make hot, sweet love


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 02:29:56 PM
Oh nullius, you're the only man who holds the password to my admin console. Now decrypt my cipher and let's make hot, sweet love

I do believe that you would be thrilled to chat about cryptography whilst I fuck you so hard, you nearly pass out when you cum.

(Did I say “nearly”?  My mistake.)

If I’m right—and I know I am—then I want you to tell your adoring audience how right I am.  Do this by slipping two fingers inside yourself, exactly where you most yearn for me, and then using your other hand to tap out an intelligent question following on one of my above crypto explanations.

Don’t be embarrassed about being a beginner.  We all were, at some point.  (I know you won’t be embarrassed to have everybody watch you masturbate while stammering out applied cryptography questions to me, and listening to the answers.  I know that only augments the thrill for you!)


Title: Re: Ciphersex 101 [NSFW]
Post by: alia on February 17, 2018, 02:32:50 PM
Oh nullius, you're the only man who holds the password to my admin console. Now decrypt my cipher and let's make hot, sweet love

I do believe that you would be thrilled to chat about cryptography whilst I fuck you so hard, you nearly pass out when you cum.

(Did I say “nearly”?  My mistake.)

If I’m right—and I know I am—then I want you to tell your adoring audience how right I am.  Do this by slipping two fingers inside yourself, exactly where you most yearn for me, and then using your other hand to tap out an intelligent question following on one of my above crypto explanations.

Don’t be embarrassed about being a beginner.  We all were, at some point.  (I know you won’t be embarrassed to have everybody watch you masturbate while stammering out applied cryptography questions to me, and listening to the answers.  I know that only augments the thrill for you!)

Fuck yes. And if I ever ask a dumb question, I want you to spank me hard - harder than it is to convince a Bcash supporter to use SegWit.


Title: Re: Ciphersex 101 [NSFW]
Post by: nullius on February 17, 2018, 02:43:15 PM
Fuck yes. And if I ever ask a dumb question, I want you to spank me hard - harder than it is to convince a Bcash supporter to use SegWit.

Well, that’s not a metaphor for a spanking.  That speaks to cattle prod territory.

Go ahead with your questions.  I am waiting—I have myself in hand waiting, so to speak.  No, hold up:  One more thing first.  Take your fingers out of yourself, and suck on them for a moment.  Then put them back, describe to me how they tasted—and then ask your cryptography questions.


Title: Re: Ciphersex 101 [NSFW]
Post by: Joel_Jantsen on March 08, 2018, 06:34:35 AM
Damn nullius,you are giving me multiple organisms with all those cipherSex talks.I'm really considering my gender preferences having two genders in the same room and I'm not impressed by the opposite.


Title: On the impending evolution of Ciphersex
Post by: Meretrix on March 21, 2018, 04:06:03 PM
Because I am a tease:

https://i.imgur.com/rJPqzeC.png


Watch me if you want.

❤️ The Meretrix





Damn nullius,you are giving me multiple organisms with all those cipherSex talks.I'm really considering my gender preferences having two genders in the same room and I'm not impressed by the opposite.

Code:
#ifndef SUSPENDED_DISBELIEF

Thank you, Joel_Jantsen.  As for disappointment with how this thread turned out, perhaps I may suggest an elegant segue to something better:  Although I’m not “bendy” that way, I can produce fictional characters of the opposite sex just as well as any other skilled author.  Consider this to be a spark which may feed the flame of a living quasi-novel I conceived some months ago (https://bitcointalk.org/index.php?topic=3116545.0).

Moreover, with luck and patience, I may perhaps come to publish bits from real “girls gone Bitcoin” through my editorial control of this account.  In my experience, (actual) women are drawn by “literotica” just as men are drawn by nudie pics.  I invite contact from women who desire to publish bits of themselves; and I offer protection of anonymity for those who need it.  For secure discussion of sexy secrets, use PGP! (https://bitcointalk.org/index.php?topic=3107429.0)

I shall lock this thread soon, but fear not:  My own brand of CS 101 shall continue, elsewhere and in other forms.

(P.S.—When in doubt, check trust pages!)

Code:
#endif /* !SUSPENDED_DISBELIEF */


Title: Re: Ciphersex 101 [NSFW]
Post by: Red Lanterns on March 21, 2018, 04:58:50 PM
Funny project


Title: Re: Ciphersex 101 [NSFW]
Post by: digaran on March 23, 2018, 09:38:39 PM
Hey nullius, I have found alia, though without any makeup.
https://i.imgur.com/koEErjc.gif.

Looks like somebody else is doing her so hard whilst talking about cryptography.