Main

related bits

0

processing priority

4

site type

3 (personal blog or private political site, e.g. Blogspot, Substack, also small blogs on own domains)

review version

11

html import

20 (imported)

Events

first seen date

2025-03-22 03:07:14

expired found date

-

created at

2025-03-22 03:07:14

updated at

2025-05-01 01:37:51

Domain name statistics

length

23

crc

43423

tld

2211

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

13642151 (wordpress.com)

previous id

0

replaced with id

0

related id

-

dns primary id

0

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

1

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

2025-03-25 02:40:24

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

69711

mp size raw text

3093

mp inner links count

1

mp inner links status

10 (links queued, awaiting import)

Open Graph

title

Broken RSA

description

image

site name

Broken RSA

author

updated

2026-03-10 16:07:40

raw text

Broken RSA Broken RSA Blog About Mission accomplished (key-only attack on RSA) Published April 1, 2011 Uncategorized 13  Comments Happy April Fools Day! I simply generated all the keys which are ‘broken’ in the comments, except the one with the certificate. That one was a different story – remember the big Debian OpenSSL fail ? That means the key was easy to guess. Really breaking a previously secure cert would be quite un-nice, as SSL does not have any forward secrecy (in the most often used mode), i.e. disclosure of the key even of an expired cert would allow an attacker to decrypt sessions sniffed long ago, while the key was in use. The RSA cryptosystem is used in a lot of critical protocols, and much of our internet security depends on RSA being secure. The security of RSA is based on the assumption that the product of two very big primes is very hard to factor, i.e. it is hard to determine those primes from their product. The public key contains the pro...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

category id

Pozostałe (16)

index version

1

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

2309

text words

516

text unique words

255

text lines

56

text sentences

24

text paragraphs

7

text words per sentence

21

text matched phrases

0

text matched dictionaries

0

RSS

rss status

32 (unknown)

rss found date

2025-03-22 03:07:15

rss size orig

5045

rss items

1

rss spam phrases

0

rss detected language

1 (English)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap status

40 (completed successful import of reports.txt file to table in_pages)

sitemap review version

2

sitemap urls count

3

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

2025-03-22 03:07:15

sitemap process date

2025-03-26 20:11:48

sitemap first import date

-

sitemap last import date

2025-05-01 01:37:51