id
related bits
0
processing priority
4
site type
3 (personal blog or private political site, e.g. Blogspot, Substack, also small blogs on own domains)
review version
11
html import
20 (imported)
first seen date
2025-03-22 03:07:14
expired found date
-
created at
2025-03-22 03:07:14
updated at
2025-05-01 01:37:51
length
23
crc
43423
tld
2211
nm parts
0
nm random digits
0
nm rare letters
0
is subdomain of id
13642151 (wordpress.com)
previous id
0
replaced with id
0
related id
-
dns primary id
0
dns alternative id
0
lifecycle status
0 (unclassified, or currently active)
deleted subdomains
0
page imported products
0
page imported random
0
page imported parking
0
count skipped due to recent timeouts on the same server IP
0
count content received but rejected due to 11-799
0
count dns errors
0
count cert errors
0
count timeouts
1
count http 429
0
count http 404
0
count http 403
0
count http 5xx
0
next operation date
2025-03-25 02:40:24
server bits
—
server ip
-
mp import status
20
mp rejected date
-
mp saved date
-
mp size orig
69711
mp size raw text
3093
mp inner links count
1
mp inner links status
10 (links queued, awaiting import)
title
Broken RSA
description
image
site name
Broken RSA
author
updated
2026-03-10 16:07:40
raw text
Broken RSA Broken RSA Blog About Mission accomplished (key-only attack on RSA) Published April 1, 2011 Uncategorized 13 Comments Happy April Fools Day! I simply generated all the keys which are ‘broken’ in the comments, except the one with the certificate. That one was a different story – remember the big Debian OpenSSL fail ? That means the key was easy to guess. Really breaking a previously secure cert would be quite un-nice, as SSL does not have any forward secrecy (in the most often used mode), i.e. disclosure of the key even of an expired cert would allow an attacker to decrypt sessions sniffed long ago, while the key was in use. The RSA cryptosystem is used in a lot of critical protocols, and much of our internet security depends on RSA being secure. The security of RSA is based on the assumption that the product of two very big primes is very hard to factor, i.e. it is hard to determine those primes from their product. The public key contains the pro...
redirect type
0 (-)
block type
0 (no issues)
detected language
1 (English)
category id
Pozostałe (16)
index version
1
spam phrases
0
text nonlatin
0
text cyrillic
0
text characters
2309
text words
516
text unique words
255
text lines
56
text sentences
24
text paragraphs
7
text words per sentence
21
text matched phrases
0
text matched dictionaries
0
links self subdomains
0
links other subdomains
0
links other domains
links spam adult
0
links spam random
0
links spam expired
0
links ext activities
0
links ext ecommerce
0
links ext finance
0
links ext crypto
0
links ext booking
0
links ext news
0
links ext leaks
0
links ext ugc
31 - s0.wp.com, wp.me, s1.wp.com, wordpress.com, en.forums.wordpress.com, en.support.wordpress.com, learn.wordpress.com, planet.wordpress.org, en.blog.wordpress.com
links ext klim
0
links ext generic
0
dol status
0
dol updated
2026-03-10 16:07:40
rss status
32 (unknown)
rss found date
2025-03-22 03:07:15
rss size orig
5045
rss items
1
rss spam phrases
0
rss detected language
1 (English)
inbefore feed id
-
inbefore status
0 (new)
sitemap path
sitemap status
40 (completed successful import of reports.txt file to table in_pages)
sitemap review version
2
sitemap urls count
3
sitemap urls adult
0
sitemap filtered products
0
sitemap filtered videos
0
sitemap found date
2025-03-22 03:07:15
sitemap process date
2025-03-26 20:11:48
sitemap first import date
-
sitemap last import date
2025-05-01 01:37:51