You're looking at Less Wrong's discussion board. This includes all posts, including those that haven't been promoted to the front page yet. For more information, see About Less Wrong.

A sealed prediction

9 Post author: Quirinus_Quirrell 28 January 2011 04:10AM

I would like to make a prediction, but I'm not ready to raise the subject of the prediction just yet. So to show that it was not just obvious in hindsight, and to strengthen my precommitment to write an article about it later, here is the sha1sum of my prediction: 9805a0c7bf3690db25e5753e128085c4191f0114.

Comments (43)

Comment author: [deleted] 23 July 2011 01:27:28PM 9 points [-]

Almost 6 months now.

Comment author: Jack 30 January 2012 01:07:00AM 9 points [-]

Has now been one year.

Comment author: grinchler 26 December 2013 06:52:11PM 3 points [-]

Approaching on three years.

Comment author: gwern 30 January 2013 05:09:47PM 8 points [-]

Update: still nothing about this. Starting to look like he was going to use it as a cheap gotcha - register a prediction and reveal it only if he was right.

Comment author: gwern 30 January 2014 04:25:31PM 3 points [-]

Nothing as of Jan 2014.

Comment author: drethelin 11 April 2014 09:58:54PM 0 points [-]

glad someone but me is keeping an eye out

Comment author: Unnamed 28 January 2011 04:15:16AM 20 points [-]

Here is the sha1sum of Quirinus_Quirrell's prediction where he can't edit it: 9805a0c7bf3690db25e5753e128085c4191f0114.

Comment author: sketerpot 28 January 2011 04:36:45AM 14 points [-]

And another one as backup, because this is Professor Quirrell we're talking about here:

9805a0c7bf3690db25e5753e128085c4191f0114

Obviously, though, this is all misdirection from his real scheme.

Comment author: endoself 28 January 2011 04:41:19AM 17 points [-]

Of course, he would have two sockpuppets, to quell suspicion of the first one.

9805a0c7bf3690db25e5753e128085c4191f0114

Constant vigilance!

Comment author: Quirinus_Quirrell 28 January 2011 10:16:15PM *  13 points [-]

You're safeguarding against the wrong thing. If I needed to fake a prediction that badly, I'd find a security hole in Less Wrong with which to edit all your comments. I wouldn't waste time establishing karma for sockpuppets to post editable hashes to deter others from posting hashes themselves, that would be silly. But as it happens, I'm not planning to edit this hash, and doing that wouldn't have been a viable strategy in the first place.

Comment author: Unnamed 07 July 2015 06:55:51AM 2 points [-]

"Clearly, the way to make our safeguards super-secure is to make yet another comment with the hash."

"Clearly, the way to make my safeguards super-secure is to make yet another Horcrux."

Somehow, you could only see through one of these strategies.

Comment author: Benquo 28 January 2011 02:22:47PM 3 points [-]

9805a0c7bf3690db25e5753e128085c4191f0114

Comment author: DanielLC 28 January 2011 06:58:53PM 3 points [-]

How do I know you're not all sock puppets of him? Clearly, the only solution is for everyone to keep a copy of it themselves.

Comment author: JGWeissman 28 January 2011 07:13:15PM 10 points [-]

Edited comments have an asterisk after the date, the lack of this asterisk indicates the comment has not been edited. Though this does not work for top level posts.

Comment author: DanielVarga 28 January 2011 08:58:36PM 13 points [-]

Maybe they are all someone else's sockpuppets. At a given date, they will coordinatedly change some whitespace in their comments (but not the hash itself), thus framing Quirrell. Fortunately, now that I unmasked the plan, it is not really viable anymore.

Comment author: komponisto 29 January 2011 06:22:42PM 2 points [-]

Edited comments have an asterisk after the date

I never noticed that before.

Comment author: Larks 28 January 2011 05:20:28PM *  5 points [-]

It's worth noting, people, that Unnamed joined Less Wrong before Eliezer started writing Methods.

Having said that, it's not clear to me we want to do all this. Sometimes we could be at a game-theoretic advantage by not knowing something. E.g. I don't want to be able to be told that someone's kidnapped my daughter, because then they have no incentive to do so (TDT aside). Maybe Quirrell is actually planning on us being able to verify his honesty.

Comment author: Alicorn 28 January 2011 07:23:43PM *  9 points [-]

E.g. I don't want to be able to be told that someone's kidnapped my daughter, because then they have no incentive to do so (TDT aside)

Unless they just want your daughter, instead of wanting whatever behavior they could use her to coerce you into. So really what you don't want is a way to receive ransom demands.

Comment author: Unnamed 28 January 2011 08:23:25PM 1 point [-]

I've also done this 'reply to someone else's hashed prediction so they can't edit it' thing before. There were some other suggestions of how to verify hashed predictions in that discussion, if our asterisk-free comments seem insufficiently secure for dealing with User!Quirinus_Quirrell.

Comment author: TheOtherDave 28 January 2011 05:39:29PM 0 points [-]

Right now, we have no grounds for considering being able to confirm a deception in this matter more dangerous than being unable to. If at some point in the future such grounds arise, Unnamed (and everyone else) can delete or edit their comments, thereby eliminating the more dangerous option.

Comment author: Dorikka 06 October 2011 02:43:04AM 4 points [-]

Any update on this?

Comment author: DanArmak 28 January 2011 01:17:57PM *  4 points [-]

sha1 seems likely to be broken sooner later than later:

http://en.wikipedia.org/wiki/SHA-1#SHA-1

http://code.google.com/p/hashclash/

Someone as clever, powerful, and rich as yourself can likely find a collision if you get to choose both source texts (which is easier than finding a collision with one of the two inputs determined by someone else).

To increase our confidence, I suggest you post hashes of the same prediction text made by several different algorithms, e.g. SHA2-512 and each of the SHA3 finalists. I also suggest you commit to the hashed prediction text beginning with the words, "I, Quirinus Quirrel (on LW) predict that: " - so you can't choose your entire source text.

Comment author: Snowyowl 28 January 2011 05:00:09PM 14 points [-]

I made a prediction with sha1sum 0000000000000000000000000000000000000000. It's the prediction that sha1sum will be broken. I'll only reveal the exact formulation once I know whether it was true or false.

Comment author: Quirinus_Quirrell 28 January 2011 06:14:21PM 9 points [-]

Someone as clever, powerful, and rich as yourself can likely find a collision if you get to choose both source texts (which is easier than finding a collision with one of the two inputs determined by someone else).

This is actually much harder than you'd think. A hash function is considered broken if any collision is found, but a mere collision is not sufficient; to be useful, a collision must have chosen properties. In the case of md5sum, it is possible to generate collisions between files which differ in a 128-byte aligned block, with the same prefix and suffix. This works well for any file format that is scriptable or de-facto scriptable - wrap the colliding block in a comparison statement, and behave differently depending on its result. However, even for md5sum, it is still impossible to generate a collision between plain-text files with two separate chosen texts; nor is it possible to generate collisions between files that have no random-seeming sections, or that have random sections that are too small, not block-aligned, or are drawn from a constrained alphabet. (Snowyowl's joke would require a preimage attack, which is harder still, and which won't be available at first even if sha1sum is broken, so he will not be able to fulfill his promise to reveal a message with that sha1sum.)

Anyways, since you asked, here are a few more hashes of the same thing. I didn't bother with the SHA3 finalists, since they don't seem to have made convenient command-line utilities yet and I don't want to force people to fiddle too much to verify my hashes.

sha512sum: 85cf46426d025843d6b0f11e3232380c6fac6cae88b66310ee8fbcd3f81722d08b2154c6388ecb1ee9cebc528e0f56e3be7a057cd67531cfda442febe0132418 sha384sum: 400d47bf97b6a3ccd662e0eb1268820c57d10e2a623c3a007b297cc697ed560862dda19b74638f92a3550fbbfe14d485 md5sum: 8fec2109c85f622580e1a78c9cabdab4

Comment author: JoshuaZ 30 January 2011 01:46:13AM 3 points [-]

Anyways, since you asked, here are a few more hashes of the same thing. I didn't bother with the SHA3 finalists, since they don't seem to have made convenient command-line utilities yet and I don't want to force people to fiddle too much to verify my hashes.

There's another reason not to do so. No one has thought strongly about how the different hashes would interact together. It wouldn't surprise me if there were some way given the various hashes to extract information that would not otherwise be extractable given any single hash scheme. This is all the more plausible given that you've given the hash for the fairly weak md5. The multiple hashes you have given make it implausible that you could have multiple texts that lead to the same result; adding more hash types has more of an effect now of making it conceivable that a sufficiently interested individual could identify your text.

Comment author: ciphergoth 29 January 2011 10:20:23AM 2 points [-]

impossible that is, not currently publically known to be possible - MD5 gets more broken all the time, so I wouldn't want to be very confident about what is impossible.

sha512sum: 85cf46426d025843d6b0f11e3232380c6fac6cae88b66310ee8fbcd3f81722d08b2154c6388ecb1ee9cebc528e0f56e3be7a057cd67531cfda442febe0132418 sha384sum: 400d47bf97b6a3ccd662e0eb1268820c57d10e2a623c3a007b297cc697ed560862dda19b74638f92a3550fbbfe14d485 md5sum: 8fec2109c85f622580e1a78c9cabdab4

Comment author: philh 26 December 2013 10:06:50PM 1 point [-]

I don't think you get notified when people reply to you top-level, so I'll ask here in case you forgot - any update on this?

Comment author: saturn 28 January 2011 06:19:58PM 4 points [-]

It's extremely unlikely that a useful collision exists. The number of short paragraphs in English which make sense and describe a prediction is much, much smaller than the number of SHA1 values. However, if Quirrel's prediction turns out to be very wordy, or comes in a form other than plain text, your suspicion will be confirmed.

Comment author: JoshuaZ 28 January 2011 04:30:18AM 15 points [-]

Note that if the predicted event occurs less than six hours from now we should consider the possibility that Quirrell brought a time-turner with him when he fled the story.

Comment author: Jack 28 January 2011 06:26:58AM *  5 points [-]

If Quirrell has a time-turner it seems plausible the time cost required for finding SHA-1 collisions would be irrelevant and the entire method would be insecure.

Comment author: JoshuaZ 28 January 2011 06:31:55AM *  8 points [-]

If Quirrell has a time-turner it seems plausible the time cost required for finding SHA-1 collisions would be irrelevant and the entire method would be insecure.

Harry's work suggest that time-turners respond poorly to being used for computational short-cuts.

Comment author: Document 30 January 2011 08:09:48AM 2 points [-]
Comment author: Jack 28 January 2011 06:36:02AM *  0 points [-]

Hmmmm. I thought the outcome of that experiment was more ambiguous than that- didn't his attempt return a cryptic "Don't mess with time travel"?

Comment author: wedrifid 28 January 2011 08:33:09AM 10 points [-]

Which, while it is cryptic, certainly gives us a strong indication about the expected success of time-travel computation.

(Without MoRverse) It reminds us to consider the implications of physics and the evident time travel mechanism. At the simplest level we can ask ourselves "What is more likely? We derive the right result or we get eaten by a black swan while trying?"

A consideration to make with respect to Harry's experiment in particular is that what we discovered was only that it is more likely for Harry to panic than for Harry to solve that particular computational task via that method. Not enough to rule out some degree of shortcut taking but certainly enough to be rather careful when taking it to the extremes of brute force decryption.

Comment author: orthonormal 29 January 2011 11:55:32PM 1 point [-]

An excellent point.

Comment author: Jack 28 January 2011 06:31:06AM 7 points [-]

You all realize of course that if the prediction is false Quirrell need never say anything about it again.

Comment author: JoshuaZ 28 January 2011 06:47:01AM 21 points [-]

So, remember to ask him about it periodically. If it doesn't get revealed in a few months, one can assume he's wrong.

But, Quirrell would understand that if he is wrong, demonstrating that he's willing to admit that would raise his status in this group, and will act accordingly. Indeed, given that it is Quirrell, the hash might even correspond to something he expects not to happen so he can then reveal that he was wrong in a way that not only increases his status but also cause us to underestimate him.

Comment author: Davorak 29 January 2011 10:27:59AM 3 points [-]

The second explanation humorous, but for the most part also like a large waste of time.

Comment author: Clippy 28 January 2011 04:30:31PM *  5 points [-]

Interesting. I made a prediction yesterday that hashes to the same sha1sum.

Just goes to show, great algorithms produce isomorphic output!

Edit: Oops, no I didn't. I don't have a prediction that hashes to tha sha1sum, I made a mistake.

Comment author: drethelin 04 March 2012 09:45:29AM 2 points [-]

Write an article already.

Comment author: NancyLebovitz 26 December 2013 08:52:27PM 1 point [-]

Just as a general point.... if I wanted to protect the hash from Quirrell modifying it, I'd have stored it as a private prediction at predictionbook, and possibly on a blog or two.

Comment author: gwern 26 December 2013 09:35:05PM 3 points [-]

A general solution would be something like my archiving setup, which resulted in this page being crawled by the Internet Archive in early 2012: https://web.archive.org/web/*/http://lesswrong.com/r/discussion/lw/421/a_sealed_prediction/

Comment author: orthonormal 29 January 2011 11:59:57PM 1 point [-]

Does this prediction concern only some event in MoR? And if so, will you reveal your prediction by the time MoR is completed?

(Damn, I had to rewrite this carefully in order to forestall a Quirrell answer. The original version had an "or" question and a "may we assume".)