cfbolz changed the topic of #pypy to: #pypy PyPy, the flexible snake | IRC logs: and | Matti: I made a bit of progress, the tests now only segfault towards the end
benjamin has quit [*.net *.split]
benjamin has joined #pypy
graingert[m] has quit [*.net *.split]
commandoline_ has quit [*.net *.split]
ctismer has quit [*.net *.split]
habnabit_ has quit [*.net *.split]
ammar2 has quit [*.net *.split]
ctismer has joined #pypy
commandoline has joined #pypy
commandoline has joined #pypy
commandoline has quit [Changing host]
habnabit_ has joined #pypy
ammar2 has joined #pypy
graingert[m] has joined #pypy
glyph has quit [Quit: End of line.]
glyph has joined #pypy
greedom has joined #pypy
<nimaje> shouldn't xoring ints with each dict getting some other random number to xor with be good enought in most cases?
<cfbolz> maybe
<cfbolz> nimaje: my biggest problem in this (security) space is that ultimately I have no real clue about it
<arigato> nimaje: I think no: the attacks are about getting the exact same hash on many keys
<arigato> so you can xor them if you like, they are still the same hash
lritter has joined #pypy
slav0nic has joined #pypy
lritter has quit [Quit: Leaving]
greedom has quit [Remote host closed the connection]
slav0nic has quit [Ping timeout: 260 seconds]