Dwayne Posted As Missing In Action

read only section for reference and search purposes.
Locked
[old] Ben Rea
Posts: 0
Joined: March 18th, 2006, 10:32 pm

Competitions

Post by [old] Ben Rea » March 2nd, 2006, 12:43 pm

ya chad, and why did you talk in the third person on one of your posts? did you think you were on a different name and posted by accident under chad williams?...

[old] mpukita

Competitions

Post by [old] mpukita » March 2nd, 2006, 12:48 pm

<!--quoteo(post=58121:date=Mar 2 2006, 11:42 AM:name=PaulS)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(PaulS @ Mar 2 2006, 11:42 AM) </b></div></td></tr><tr><td class='quote'><!--quoteo(post=58118:date=Mar 2 2006, 08:39 AM:name=mpukita)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(mpukita @ Mar 2 2006, 08:39 AM) </b></div></td></tr><tr><td class='quote'>However, news flash here, I just took a phone call. <br /><br />I now have evidence that you are not a real person as "Chad" ... you're "Chad" personna is a pseudonym for someone else here. That's why you won't row at Evesham, because you'd have to "blow your cover" before the "unveiling" of your new stroke and training at BIRC. The problem is, someone close to you could not keep a secret. But now I know, and I have evidence.<br /><br /> :twisted: <br /> </td></tr></table><br /><br />Okay Mark, then post your evidence. Don't be part of the same old problem... :P<br /> </td></tr></table><br /><br />I have to take some time to get it ready ... but let me change the topic.<br /><br />Chad's in the UK. He could easily come to Evesham, but he won't. I'll even volunteer to pay his expenses to get there and back (he can take the train with me), his lodging, his meals, his brews, and to race (entry fee). He can stay with me at:<br /><br /><a href="http://www.eveshamhotel.com/" target="_blank">http://www.eveshamhotel.com/</a><br /><br />I just made my booking this morning. It looks like a very nice, unique place.<br /><br />I'll bet he'll turn this down as well. Don't even have to think about what his response will be. It will be NO.<br /><br />Now, think about why that would be?<br /><br />I have the evidence. Chad is "busted".

[old] FrancoisA
Posts: 0
Joined: March 18th, 2006, 10:32 pm

Competitions

Post by [old] FrancoisA » March 2nd, 2006, 12:48 pm

<!--quoteo(post=58110:date=Mar 2 2006, 04:26 PM:name=mpukita)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(mpukita @ Mar 2 2006, 04:26 PM) </b></div></td></tr><tr><td class='quote'>Please do not believe what you've read here about how easy it is to "fool" the PM3. The encryption they use for the piece records is robust, virtually unbreakable (not easy decoded ... almost impossible).<br /> </td></tr></table><br />The algorithm that generates the code is not hard wired in the PM3, but part of the software download (version 90, I believe). Knowing which processor runs in the PM3, it should be possible to disassemble the code and get the algorithm. It should also be possible to simulate that chip, and even the whole PM3 unit on a computer. I would not be surprised that Concept2 does just that for testing purposes. <br />Even a multi billions company like Apple has not been able to prevent its OS X operating system from being hacked to run on PCs!<br /><br />Now, I am not even hinting that Dwayne did that! Just saying that it is possible.<br /><br />Francois<br /><br />

[old] Chad Williams
Posts: 0
Joined: March 18th, 2006, 10:32 pm

Competitions

Post by [old] Chad Williams » March 2nd, 2006, 12:49 pm

“Can’t answer any of the questions asked so lets change the subject". Losing face again Mark?<br /><br /><br />

[old] hjs
Posts: 0
Joined: March 18th, 2006, 10:32 pm

Competitions

Post by [old] hjs » March 2nd, 2006, 12:52 pm

<!--quoteo(post=58121:date=Mar 2 2006, 05:42 PM:name=PaulS)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(PaulS @ Mar 2 2006, 05:42 PM) </b></div></td></tr><tr><td class='quote'><!--quoteo(post=58118:date=Mar 2 2006, 08:39 AM:name=mpukita)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(mpukita @ Mar 2 2006, 08:39 AM) </b></div></td></tr><tr><td class='quote'>However, news flash here, I just took a phone call. <br /><br />I now have evidence that you are not a real person as "Chad" ... you're "Chad" personna is a pseudonym for someone else here. That's why you won't row at Evesham, because you'd have to "blow your cover" before the "unveiling" of your new stroke and training at BIRC. The problem is, someone close to you could not keep a secret. But now I know, and I have evidence.<br /><br /> :twisted: <br /> </td></tr></table><br /><br />Okay Mark, then post your evidence. Don't be part of the same old problem... :P<br /> </td></tr></table><br /><br /><br />Does it Matter who "chad" is? Absolutely not.<br /> <br />The person behind the name chad is just the one who made the ball roll again. <br /><br />The facts remain the same:<br /><br />A lot of people think that someone is cheating. That fact stands tall and will be standing tall. <br /><br />

[old] mpukita

Competitions

Post by [old] mpukita » March 2nd, 2006, 12:53 pm

<!--quoteo(post=58125:date=Mar 2 2006, 11:48 AM:name=FrancoisA)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(FrancoisA @ Mar 2 2006, 11:48 AM) </b></div></td></tr><tr><td class='quote'><!--quoteo(post=58110:date=Mar 2 2006, 04:26 PM:name=mpukita)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(mpukita @ Mar 2 2006, 04:26 PM) </b></div></td></tr><tr><td class='quote'>Please do not believe what you've read here about how easy it is to "fool" the PM3. The encryption they use for the piece records is robust, virtually unbreakable (not easy decoded ... almost impossible).<br /> </td></tr></table><br />The algorithm that generates the code is not hard wired in the PM3, but part of the software download (version 90, I believe). Knowing which processor runs in the PM3, it should be possible to disassemble the code and get the algorithm. It should also be possible to simulate that chip, and even the whole PM3 unit on a computer. I would not be surprised that Concept2 does just that for testing purposes. <br />Even a multi billions company like Apple has not been able to prevent its OS X operating system from being hacked to run on PCs!<br /><br />Now, I am not even hinting that Dwayne did that! Just saying that it is possible.<br /><br />Francois<br /> </td></tr></table><br /><br />Go to work on that Francois, and come back to us in 4 or 5 years once you've broken the code. Reverse compiling (or "decompiling") machine language code is EXTREMELY difficult. Breaking an encryption routine, even if it's not 128-bit, is still almost impossible unless you're some government agency or university research organization that's well funded.

[old] Chad Williams
Posts: 0
Joined: March 18th, 2006, 10:32 pm

Competitions

Post by [old] Chad Williams » March 2nd, 2006, 12:56 pm

When the pressure is on the Dwayne Adams cheerleaders they just fold. You know when they are on the ropes as they turn their actions against me.<br /><br />Come on, hit me with some Dwayne rowing facts!!!<br /><br /><br /><br />

[old] mpukita

Competitions

Post by [old] mpukita » March 2nd, 2006, 1:07 pm

<!--quoteo(post=58127:date=Mar 2 2006, 11:52 AM:name=hjs)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(hjs @ Mar 2 2006, 11:52 AM) </b></div></td></tr><tr><td class='quote'>[The facts remain the same:<br /><br />A lot of people think that someone is cheating. That fact stands tall and will be standing tall.<br /> </td></tr></table><br /><br />Actually, there are no "facts" just pieces of data cobbled together to draw the conclusion the cobbler desired.<br /><br />Better said as:<br /><br />"A lot of people "think", "believe", "feel" Dwayne is cheating. The "feelings", "thoughts", and "beliefs" will stand tall in their minds, until he proves he did not cheat."<br /><br />In other words, he needs not only to do the time, but prove it's not a lie. Proving a negative as it were.<br /><br />Let's face it. You guys want him to race, and he won't. That's driving you CRAZY. You're sizzlin' like bacon cooking in a hot pan ... sizzle sizzle pop ...<br /><br /><!--quoteo(post=58126:date=Mar 2 2006, 11:49 AM:name=Chad Williams)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(Chad Williams @ Mar 2 2006, 11:49 AM) </b></div></td></tr><tr><td class='quote'>“Can’t answer any of the questions asked so lets change the subject". Losing face again Mark?<br /> </td></tr></table><br /><br />Hmmm ... wonder where I learned this technique ... "Chad" ... (I know who you are!) ...

[old] FrancoisA
Posts: 0
Joined: March 18th, 2006, 10:32 pm

Competitions

Post by [old] FrancoisA » March 2nd, 2006, 1:07 pm

<!--quoteo(post=58128:date=Mar 2 2006, 04:53 PM:name=mpukita)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(mpukita @ Mar 2 2006, 04:53 PM) </b></div></td></tr><tr><td class='quote'>Go to work on that Francois, and come back to us in 4 or 5 years once you've broken the code. Reverse compiling (or "decompiling") machine language code is EXTREMELY difficult. Breaking an encryption routine, even if it's not 128-bit, is still almost impossible unless you're some government agency or university research organization that's well funded.<br /> </td></tr></table><br />Mark, don't challenge me... (my background is math and computer science; I even took a cryptography course) :D <br /><br />You don't need to break the encryption routine, it is already in the software download, and one can find the chip it runs on.

[old] tmcguiness
Posts: 0
Joined: March 18th, 2006, 10:32 pm

Competitions

Post by [old] tmcguiness » March 2nd, 2006, 1:25 pm

<!--quoteo(post=58131:date=Mar 2 2006, 12:07 PM:name=FrancoisA)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(FrancoisA @ Mar 2 2006, 12:07 PM) </b></div></td></tr><tr><td class='quote'><!--quoteo(post=58128:date=Mar 2 2006, 04:53 PM:name=mpukita)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(mpukita @ Mar 2 2006, 04:53 PM) </b></div></td></tr><tr><td class='quote'>Go to work on that Francois, and come back to us in 4 or 5 years once you've broken the code. Reverse compiling (or "decompiling") machine language code is EXTREMELY difficult. Breaking an encryption routine, even if it's not 128-bit, is still almost impossible unless you're some government agency or university research organization that's well funded.<br /> </td></tr></table><br />Mark, don't challenge me... (my background is math and computer science; I even took a cryptography course) :D <br /><br />You don't need to break the encryption routine, it is already in the software download, and one can find the chip it runs on.<br /> </td></tr></table><br /><br /><br />Figuring out the encryption method is probably as easy as asking. No encryption worth it's salt will hide the algorithm. I'm guessing that the PM3 uses some sort of public/private key encryption which is probably just being used to digitally sign a hashed value that represents the data collected from the row. Altering this information would be impossible without being detected (OK... let's just say so extremely improbable that it is for all practical purposes, impossible). <br /><br />The weakness in the data would be the generation of the data. I'm sure if one wanted to simulate a row, it could probably be done with relative ease either by programming through the SDK (I've not looked at it to know if this is possible... but I imagine it is) or by mechanically fooling the erg to recognize work that hasn't been done legitimately.<br /><br />But then, who cares?

[old] mpukita

Competitions

Post by [old] mpukita » March 2nd, 2006, 1:45 pm

That's all well and good, but with 128-bit encryption, you'd need to have the key, and work through an incredible number of calculations and "guesses" to break the encryption. You can have the software, the processor, the whole shooting match, but still be unable to de-encrypt for YEARS.

[old] tmcguiness
Posts: 0
Joined: March 18th, 2006, 10:32 pm

Competitions

Post by [old] tmcguiness » March 2nd, 2006, 1:56 pm

<!--quoteo(post=58140:date=Mar 2 2006, 12:45 PM:name=mpukita)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(mpukita @ Mar 2 2006, 12:45 PM) </b></div></td></tr><tr><td class='quote'>That's all well and good, but with 128-bit encryption, you'd need to have the key, and work through an incredible number of calculations and "guesses" to break the encryption. You can have the software, the processor, the whole shooting match, but still be unable to de-encrypt for YEARS.<br /> </td></tr></table><br /><br />Yup... we're on the same page. Messing with legitimate data isn't going to happen. It looks to me though that it wouldn't be extremely difficult to fool the pm3 into thinking a row had been done that had not really been done. <br /><br />I'm not a coder, so I doubt if I could do it, but looking at the CSAFE protocol, it looks like a row could be "simulated".

[old] Porkchop
Posts: 0
Joined: March 18th, 2006, 10:32 pm

Competitions

Post by [old] Porkchop » March 2nd, 2006, 3:01 pm

Summing up: :lol: <br /><br />Here's where I think we are. Others may disagree. Discuss among yourselves if you wish.<br /><br />Chad says he has proof that Dwayne is a fraud and a cheat, but won't give it to us. He wants Dwayne to provide proof that Dwayne has done what he says. But Chad continues to reject all prior offers of proof as inadequate and/or untrustworthy, because witnesses can lie, the PM3 can be rigged, a relay could have done it in Dwayne's stead, etc. (He provides no specific basis to assert that these things actually have happened, but asserts that they could happen.)<br /><br />At this rate, I suspect that even if Dwayne showed up at Chad's house, gym, or boathouse, and rowed an incredible 2K, it would still not satisfy Chad, <b>because there would be no definitive proof that the person in front of Chad is really Dwayne!</b> Of course, by definition, an incredible 2K would simply not be credible anyway. After all, identification documents can be forged; Dwayne might pay someone else to show up and pass himself off as Dwayne. Chad does not appear to have ever met Dwayne in person, and neither have I. Even if we had, how are we to know if it is the <b>real</b> Dwayne or some impostor? For that matter, how do we really know that Dwayne really exists? (The philosophically inclined can chime in with a learned discussion of rationalism and empiricism now. We can have nice off-topic romp through the works of Descarte, Spinoza, Leibniz, Locke, Berkely, and Hume.)<br /><br />It's no wonder Dwayne stays off this thread as much as possible -- either he doesn't really exist or he's the only sane person on this entire forum (if the forum really exists). :)

[old] mpukita

Competitions

Post by [old] mpukita » March 2nd, 2006, 4:17 pm

<!--quoteo(post=58142:date=Mar 2 2006, 12:56 PM:name=todd)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(todd @ Mar 2 2006, 12:56 PM) </b></div></td></tr><tr><td class='quote'><!--quoteo(post=58140:date=Mar 2 2006, 12:45 PM:name=mpukita)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(mpukita @ Mar 2 2006, 12:45 PM) </b></div></td></tr><tr><td class='quote'>That's all well and good, but with 128-bit encryption, you'd need to have the key, and work through an incredible number of calculations and "guesses" to break the encryption. You can have the software, the processor, the whole shooting match, but still be unable to de-encrypt for YEARS.<br /> </td></tr></table><br /><br />Yup... we're on the same page. Messing with legitimate data isn't going to happen. It looks to me though that it wouldn't be extremely difficult to fool the pm3 into thinking a row had been done that had not really been done. <br /><br />I'm not a coder, so I doubt if I could do it, but looking at the CSAFE protocol, it looks like a row could be "simulated".<br /> </td></tr></table><br /><br />Ahhh ... I see what you're getting at. No need to break the encryption if you can just simulate a row in code. However, if the machine code in the PM3 is compiled (don't know if it is or not), and not executable from real-time instructions (shoot, I forget the terminology for what I'm trying to describe), it would still be a bear to figure out how it all works at the PM3 level. PhD in Computer Science sort of stuff.<br /><br />I remember -- interpretive. The programming language of the PM3 can't possibly be interpretive, can it? It would need a whole lot more juice to work in an interpretive manner, no? If not, a had nut to crack, yes?<br /><br /><!--quoteo(post=58152:date=Mar 2 2006, 02:01 PM:name=Porkchop)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(Porkchop @ Mar 2 2006, 02:01 PM) </b></div></td></tr><tr><td class='quote'>It's no wonder Dwayne stays off this thread as much as possible -- either he doesn't really exist or he's the only sane person on this entire forum (if the forum really exists). :)<br /> </td></tr></table><br />It's mental illness ... Dwayne has multiple personalities, and Dwayne <b>really is </b> Chad! At least in Dwayne's mind he is.<br /><br />Actually, he's not, and I know who he is ... and when everyone finds out, man, are they are gonna flip out. Wig out. Have a canary. Etc.<br /><br />Notice how quiet Chad has gotten lately?

[old] tmcguiness
Posts: 0
Joined: March 18th, 2006, 10:32 pm

Competitions

Post by [old] tmcguiness » March 2nd, 2006, 4:24 pm

<!--quoteo(post=58140:date=Mar 2 2006, 12:45 PM:name=mpukita)--><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><div class='genmed'><b>QUOTE(mpukita @ Mar 2 2006, 12:45 PM) </b></div></td></tr><tr><td class='quote'>Ahhh ... I see what you're getting at. No need to break the encryption if you can just simulate a row in code. However, if the machine code in the PM3 is compiled (don't know if it is or not), and not executable from real-time instructions (shoot, I forget the terminology for what I'm trying to describe), it would still be a bear to figure out how it all works at the PM3 level. PhD in Computer Science sort of stuff.<br /><br />I remember -- interpretive. The programming language of the PM3 can't possibly be interpretive, can it? It would need a whole lot more juice to work in an interpretive manner, no? If not, a had nut to crack, yes?<br /> </td></tr></table><br /><br /><br />You wouldn't need the pm3 code. C2 provides a software development kit (SDK) that uses an industry-wide (fitness industry) standard protocol called CSAFE. I haven't looked at it in any real detail, but it looks like CSAFE allows you to write data to the PM3 as well as read from it. I don't think it would be rocket science. I imagine one of the folks on the development thread could clarify or correct me if I'm wrong.<br /><br />I imagine you could use more neanderthal methods and physically manipulate the erg to make the PM3 think somebody is really rowing. <br /><br />Course this is all WAY off the thread and I sure don't mean to hijack this <b>very important</b> topic :lol: <br />

Locked