-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ####################################################### Powers of Tau attestation disturbedsquirrel ############## ## General sidechannel defenses: # Contacted Sean Bowe using Whonix who forwarded my message to Jason Davies. # Always communicated using Tor to prevent an adversary from obtaining my geographical location prior to the computation. # Computation was done in an empty room in my home's basement. All unnecessary electronic devices were kept outside the ceremony room (including my phone which was additionally wrapped in tinfoil). I was the only person in the house at the time. Necessary Ethernet connections were made via 50 m cable to my server room upstairs. I was in the ceremony room the whole time. ## Preparation a few days prior to computation day: # Purchased a used desktop PC with cash from a stranger and removed the HDD. No Wifi equipment was present at the machine. # Drove to a friend of mine and downloaded a fresh Ubuntu 17.04 x64 DVD image via his machine running Linux Mint 17.04 as OS. # Verified the image via the hash provided on the Ubuntu homepage and wrote it to a raw DVD. # At home I booted up the Powers of Tau computation machine with the Ubuntu live DVD and built the compute binary which was then saved on a newly purchased USB drive. The USB drive was put into a safe. ## Procedure on computation day: # Booted a second machine (notebook) with the Ubuntu live DVD, downloaded and installed Tor Browser and retrieved the challenge file via Tor. # Copied the challenge file onto the USB drive which already contained the compute binary. # Powered down the notebook and booted the Powers of Tau computation machine with the same Ubuntu live DVD. # On computation machine first rust was installed and then Ethernet removed. # Plugged in USB drive and started computation via Terminal. ## Computation ceremony: # Entropy was generated by entering a random string in addition to 100 numbers generated by a roulette wheel. # Computation took about one and a half hours. ############## The BLAKE2b hash of `./response` is: bd44847d 072914a8 3de15761 45237532 8042e25b 8484a7f5 1742c003 8e05a217 5a1ea4c3 f6b50f9b 394babda 70fff55f 1ee30798 d8cd5590 7178f725 a1a5ebfb ############## ## Postprocessing: # Saved the BLAKE2b hash on the USB drive and powered down the computation machine. # Booted notebook again with Ubuntu live DVD, downloaded and installed Tor Browser. # Plugged in the USB drive containing the response file. # Uploaded response file via Tor to AWS machine. # Wrote this report on a second notebook which was used to initially contact Sean Bowe while the response file was uploading on the first notebook which was used in the ceremony. # Mailed this report to Jason Davies # Nuked the USB drive via DBAN. ####################################################### -----BEGIN PGP SIGNATURE----- iQJ8BAEBCgBmBQJahkgEXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQxN0YwNURCNUFEODM1OTUyMkEzMjNCMDc2 OUE1NDYzQUQ2NUMyRTg0AAoJEGmlRjrWXC6EGcUP/jD6Sa1WjauLF07sOrdrueS9 Q+sS8ISqsIaihiFeT6GxOU7JYTz553exbUT3k3WwUbWf99cooHd/b7PXx8V0YeWA IuZYeC5WjCrSZREEFGwBUOYfjeHE+yYgL+BHMM9TVXw7FpgnNWIwS5Lxx/C9AsxI SvpiXgiezJLb2VwfbzN/9dh9MILrS+SuhvDgYLITW+rFbF4Uubuc5blaCrN98WjT YU3yaFA86bAlVBoZ2aligeqSAKb0LRTGfswLob7mT7AGKWcUBkN3ScbMOIT8h3zj l11TbF0zNhmMVjfZCynwAY/ejZ6qjtIzC/zR4E9xZmG+KNlKwaUgTForLEq+UghX /3E4Aztkw9V2d3u4Z4BqKt7NZgQUwDTMH6WL9gcrkn78SxC/QilB3gmCJUdTgo9l A+JyZtxF8U6fC1JwpbaZZwW2qtxJR8UUV+Xt0q+KQYGv2xGQV2A0uP0mClBIQR8B ryr8zvmQH117n3naVQFnkdxt7eGYHIsBVinIYEwD7b+Zc+PK46wpTmhZEeVZmMAr Fn0jjEbudngXhRhLliVZ2nor8mJVc27B/VXWTM2qtCwDvXIQLMqVl0RaaB0QssJN +yVcEhUc2EuvKRPiyfiUG0WR4NI1MOTuVdbNtvAQCc0pK4ZnMbtERNyJ/09Z6ayK TqS7iAn1q/f0+HibO21L =B/oI -----END PGP SIGNATURE-----