## Russia, shame on you! Censorship is lame.

Or in Russian; Позор Российскому руководству! Цензура это полный бред. NOTE: In the bottom, this text is translated into Russian by orignal from I2Pd. Thanks to him. I barely knows a word Russian myself. Before, I kind of respected you, as the gov. - But now you totally lost me. Anyway, I'm deeply invovled in the I2P project these days. And saw a way to help poor russian citicens reaching

## R.I.P Return-oriented Programming (ROP)

Intel has this Control-flow Enforcement Technology (CET), as of October 20th 2017 there are no Intel processors currently being sold that support it yet. But it will be available sooner or later- however for now, have fun :) Control-flow Enforcement Technology aims to prevent return-oriented programming (ROP) and call-jump-oriented programming (COP/JOP) attacks. The Intel-developed technology tries to prevent control-flow attacks by the concept of having a shadow stack to keep

## RSA key strength and math

TL;DR Since time is a factor here, $2048$ bit is probably fine for most systems and users as long as it is replaced often, like let's encrypt does with it's ninety-day lifetimes. However for an CA I wouldn't use less than $4096$ bit keys, and probably $8192$ bit keys if they where to live longer than ~2030 maybe. Update: There are algorithms with sub-exponential running time for factoring integers,