See attestation_0045_ben.md
in this directory for Ben Edgington's signed attestation.
Hash of the challenge
file for verification:
c13dedda 076022e6 be2d634d a910930c
2154b002 99d4db5c 5462f13f d5fb19f4
8cda31bb 63e65a6f cdc6b482 0cc6a4ad
dbfe7ed2 446beab8 b63b7214 1fdc0c80
response
was based on the hash:
c13dedda 076022e6 be2d634d a910930c
2154b002 99d4db5c 5462f13f d5fb19f4
8cda31bb 63e65a6f cdc6b482 0cc6a4ad
dbfe7ed2 446beab8 b63b7214 1fdc0c80
Hash of the response
file for verification:
213b9ab7 06ea361c 50a34515 47f17bf6
370acade b17466a9 3db23b9b d4326375
785ac440 639809a4 398c603e 031861f2
c388ae35 9df8b31d 09994e82 885ddf06
Blake2b hash of the new_challenge
file for participant #46:
939038cd 2dc5a1c0 20f368d2 bfad8686
950fdf7e c2d2e192 a7d59509 3068816b
becd914b a293dd8a cb6d18c7 b5116b66
ea54d915 d47a89cc fbe2d5a3 444dfbed
The above new_challenge
file: https://ppot.blob.core.windows.net/public/challenge_0046
Ben Edgington's attestation:
Date: Sat Jun 27 2020 - Sun Jun 28 2020 Name: Ben Edgington Location: United Kingdom Device: Ubuntu Server 20.04 VirtualBox VM allocated 12 CPU threads of an AMD Ryzen 3900X and 32GB memory Commit Hash: bf852c168676a7afc5dd17b47ff9b8f394aeab8a Challenge: URL: https://ppotuk.blob.core.windows.net/public/challenge\_0045 Software version: https://github.com/kobigurk/phase2-bn254/commit/bf852c168676a7afc5dd17b47ff9b8f394aeab8a
`challenge` file contains decompressed points and has a hash:
c13dedda 076022e6 be2d634d a910930c
2154b002 99d4db5c 5462f13f d5fb19f4
8cda31bb 63e65a6f cdc6b482 0cc6a4ad
dbfe7ed2 446beab8 b63b7214 1fdc0c80
`challenge` file claims (!!! Must not be blindly trusted) that it was based on the original contribution with a hash:
e4ee7ebc 787ec108 af7597d6 868c8df1
d9cc4d97 e5ef8beb 9d94f055 c8a9d651
bd1d7b0f 1f8bdb6e 4a9ab754 c72ad6ca
3df58aa3 c9976a98 8163f527 17116f6e
Response:
The BLAKE2b hash of `./response` is:
213b9ab7 06ea361c 50a34515 47f17bf6
370acade b17466a9 3db23b9b d4326375
785ac440 639809a4 398c603e 031861f2
c388ae35 9df8b31d 09994e82 885ddf06
Time taken: Execution time 4h30m Entropy Sources: The SHA-512 hash of an audio recording of myself performing jazz improvisation on the saxophone. Side channel defences: Randomness was generated offline and air-gapped. Calculation was performed within a VM with networking disabled. Postprocessing: Securely deleted the virtual machine, virtual disk, and sources of randomness.