powersoftau-attestations/0058/report.asc

109 lines
3.8 KiB
Plaintext

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
#######################################################
Powers of Tau attestation
disturbedsquirrel
##############
## General sidechannel defenses:
# Contacted Sean Bowe using Whonix who forwarded my message to Jason Davies.
# Always communicated using Tor to prevent an adversary from obtaining my geographical location prior to the computation.
# Computation was done in an empty room in my home's basement. All unnecessary electronic devices were kept outside the ceremony room (including my phone which was additionally wrapped in tinfoil). I was the only person in the house at the time. Necessary Ethernet connections were made via 50 m cable to my server room upstairs. I was in the ceremony room the whole time.
## Preparation a few days prior to computation day:
# Purchased a used desktop PC with cash from a stranger and removed the HDD. No Wifi equipment was present at the machine.
# Drove to a friend of mine and downloaded a fresh Ubuntu 17.04 x64 DVD image via his machine running Linux Mint 17.04 as OS.
# Verified the image via the hash provided on the Ubuntu homepage and wrote it to a raw DVD.
# At home I booted up the Powers of Tau computation machine with the Ubuntu live DVD and built the compute binary which was then saved on a newly purchased USB drive. The USB drive was put into a safe.
## Procedure on computation day:
# Booted a second machine (notebook) with the Ubuntu live DVD, downloaded and installed Tor Browser and retrieved the challenge file via Tor.
# Copied the challenge file onto the USB drive which already contained the compute binary.
# Powered down the notebook and booted the Powers of Tau computation machine with the same Ubuntu live DVD.
# On computation machine first rust was installed and then Ethernet removed.
# Plugged in USB drive and started computation via Terminal.
## Computation ceremony:
# Entropy was generated by entering a random string in addition to 100 numbers generated by a roulette wheel.
# Computation took about one and a half hours.
##############
The BLAKE2b hash of `./response` is:
bd44847d 072914a8 3de15761 45237532
8042e25b 8484a7f5 1742c003 8e05a217
5a1ea4c3 f6b50f9b 394babda 70fff55f
1ee30798 d8cd5590 7178f725 a1a5ebfb
##############
## Postprocessing:
# Saved the BLAKE2b hash on the USB drive and powered down the computation machine.
# Booted notebook again with Ubuntu live DVD, downloaded and installed Tor Browser.
# Plugged in the USB drive containing the response file.
# Uploaded response file via Tor to AWS machine.
# Wrote this report on a second notebook which was used to initially contact Sean Bowe while the response file was uploading on the first notebook which was used in the ceremony.
# Mailed this report to Jason Davies
# Nuked the USB drive via DBAN.
#######################################################
-----BEGIN PGP SIGNATURE-----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=B/oI
-----END PGP SIGNATURE-----