Secure Poetry: “I have been quite confident”

A poem from snippets of two postings on cybersecurity. Trying to carve words out of jargon. Details on the creative process at the bottom of the post.

 

I have been quite confident
I have been inspired
In this simple
way to find
both options

take note of
an extra stealth factor

I hardly ever visited the office
which is what sometimes happens in the real world

which was surprisingly easy
sufficient for what I will do next

ÎïÞܐ6›­r_ÿ=fã¨ëÙ†šl¡gŒ[9™”ÝA\b³a’mš]–Ú‡Ëü›†5ÑhËJkÚÛ³²ÂÛ‰™¢”TƒN0h}

Checking for the presence
she focuses on this one
with a physical token

to make it play nicely
key and ticket are held

you should never do that
it does not make sense
leave sections of old

ݏãמŽmˆÓõæ¥Á9¼#Œ=™Ò°ÎN¤•—û-,í~…>Ñæ1d¯Ò¿eȯ\‡ì¥´Š/—IhUBz‰ë~î>•†úPÅ

I am prompted for
the basic components
that will also survive
when viewing objects

I have not seen any constraint
as I understood it
there is no tool

Establishing connection to
All rights reserved
that made my life too easy
but a bit silly

¶×—7yŠOØD†ÂâÔôñ†#®†`î46+J·‚AšˆµJöOÇ«¤ƒµGўаq£ôlQþ{Ívœ[^Ž%œ™‚Ö/•!ñ‡

Now they wait
this time she picks
all the other attributes

For completeness,
the only thing I finally need
dies and it never finishes

then it is stuck forever
Relax constraints
follow other hints
try to keep it concise

in the future
eventually obtain
accidental co-operation from
their evil agent

To perform
to confirm
and run
lo and behold
This can be done

5cd862b2780db54fc3c49e14d1517f762a41a0456c27ea68eb5a9af035ecb39b

_____

Sources here and here – the last postings of two mini-series, about technology I have been working with for a long time. I’ve built and defended it, and only in recent years I practiced how to attack it.

I collected random snippets from the first post on Kerberos, then shuffled them around until part of them appeared to be a complete poem. Then I mined the other poem on Encrypting File System for snippets that would make the poem even more complete.

The ornamental “garbage” is part of the second post.

Leave a Comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.