sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

580
active users

#hashing

0 posts0 participants0 posts today
Gary Ackerman<p>Hashing is an Integrity control that helps ensure data has not been tampered with. It provides a unique digital fingerprint for verification. <a href="https://qoto.org/tags/Hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hashing</span></a></p>
Jan :rust: :ferris:<p>Collection of universal hashing functions in Rust:</p><p><a href="https://github.com/RustCrypto/universal-hashes" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/RustCrypto/universa</span><span class="invisible">l-hashes</span></a></p><p><a href="https://floss.social/tags/Hash" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hash</span></a> <a href="https://floss.social/tags/Hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hashing</span></a> <a href="https://floss.social/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://floss.social/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a> <a href="https://floss.social/tags/RustLang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RustLang</span></a></p>
IT News<p>Hash Functions with the Golden Ratio - In the realm of computer science, it’s hard to go too far without encountering has... - <a href="https://hackaday.com/2025/04/25/hash-functions-with-the-golden-ratio/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/25/hash-f</span><span class="invisible">unctions-with-the-golden-ratio/</span></a> <a href="https://schleuss.online/tags/computerscience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computerscience</span></a> <a href="https://schleuss.online/tags/processingtime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>processingtime</span></a> <a href="https://schleuss.online/tags/efficiency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>efficiency</span></a> <a href="https://schleuss.online/tags/fibbonaci" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fibbonaci</span></a> <a href="https://schleuss.online/tags/science" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>science</span></a> <a href="https://schleuss.online/tags/hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashing</span></a> <a href="https://schleuss.online/tags/modulo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>modulo</span></a> <a href="https://schleuss.online/tags/hash" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hash</span></a></p>
Tao of Mac<p>Apple Photos phones home, but doesn't actually tell Apple anything about you</p><p>There’s witch hunts, and there’s discussions about online privacy.(...)</p><p><a href="https://mastodon.social/tags/apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apple</span></a> <a href="https://mastodon.social/tags/hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashing</span></a> <a href="https://mastodon.social/tags/image" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>image</span></a> <a href="https://mastodon.social/tags/matching" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>matching</span></a> <a href="https://mastodon.social/tags/photos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>photos</span></a> <a href="https://mastodon.social/tags/pointsofinterest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pointsofinterest</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p><p><a href="https://taoofmac.com/space/links/2025/01/01/2330" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">taoofmac.com/space/links/2025/</span><span class="invisible">01/01/2330</span></a></p>
David Senate<p>⚡️Turning my home into a mini crypto playground with Litecoin and Doge miners! Who else is mining for fun? ⛏️<br><a href="https://infosec.exchange/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://infosec.exchange/tags/Litecoin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Litecoin</span></a> <a href="https://infosec.exchange/tags/doge" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>doge</span></a> <a href="https://infosec.exchange/tags/hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashing</span></a> <a href="https://infosec.exchange/tags/funny" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>funny</span></a></p>
Genomicalist 🧬🦠🧫👩‍💻<p>Saying that blockchains are inherently bad is like saying that knifes are inherently bad.<br>Yes, they can be used for bad things. But also good things: Just consider Torvald's Git software version control implementation.</p><p><a href="https://genomic.social/tags/blockchain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blockchain</span></a> <a href="https://genomic.social/tags/hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashing</span></a> <a href="https://genomic.social/tags/git" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>git</span></a></p>
Jan :rust: :ferris:<p><span class="h-card" translate="no"><a href="https://toot.liw.fi/@liw" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>liw</span></a></span> Have a look at the "RustCrypto: <a href="https://floss.social/tags/Password" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Password</span></a> Hashes" project:</p><p><a href="https://github.com/RustCrypto/password-hashes" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/RustCrypto/password</span><span class="invisible">-hashes</span></a></p><p>They provide all kinds of password-hashing algorithms, like:<br>- Argon2<br>- PBKDF2<br>and many more</p><p><a href="https://floss.social/tags/Hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hashing</span></a> <a href="https://floss.social/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a> <a href="https://floss.social/tags/RustLang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RustLang</span></a> <a href="https://floss.social/tags/Encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Encryption</span></a></p>
zirias (on snac)Just started work on the planned "single instance mode" for <a href="https://snac.bsd.cafe?t=xmoji" class="mention hashtag" rel="nofollow noopener" target="_blank">#Xmoji</a>.<br><br>The first commit is done, adding a class implementing the core functionality using a local <a href="https://snac.bsd.cafe?t=unix" class="mention hashtag" rel="nofollow noopener" target="_blank">#Unix</a> <a href="https://snac.bsd.cafe?t=socket" class="mention hashtag" rel="nofollow noopener" target="_blank">#socket</a>. Part of the job is deriving a unique name for that socket, where <a href="https://snac.bsd.cafe?t=hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#hashing</a> comes natural.<br><br>I had a similar class in <a href="https://snac.bsd.cafe?t=qxmoji" class="mention hashtag" rel="nofollow noopener" target="_blank">#qXmoji</a> (based on <a href="https://snac.bsd.cafe?t=qt" class="mention hashtag" rel="nofollow noopener" target="_blank">#Qt</a><span></span>), and there you have <a href="https://snac.bsd.cafe?t=sha256" class="mention hashtag" rel="nofollow noopener" target="_blank">#sha256</a> at your fingertips with <code>QCryptographicHash</code>, so I just used that. You need a string from that, and sure thing, there's a <code>.toBase64()</code> method. Well, a <code>/</code> doesn't play well for filenames, but then, there's <code>.replace()</code>.<br><br>Without all these helpers from Qt, first thing I did now was searching the web for a "good" hash function, but there's certainly no need for a cryptographic one. I found <a href="https://snac.bsd.cafe?t=fnv1a" class="mention hashtag" rel="nofollow noopener" target="_blank">#FNV1a</a>. It's super easy to implement in <a href="https://snac.bsd.cafe?t=c" class="mention hashtag" rel="nofollow noopener" target="_blank">#C</a>. And for the base64 part, well, doing it myself, I can directly use a modified set of digits, without the <code>/</code>.<br><br>Now, here's the whole thing:<br><a href="https://github.com/Zirias/xmoji/commit/db764e3184537d42b528e718bd4886495eb45544" rel="nofollow noopener" target="_blank">https://github.com/Zirias/xmoji/commit/db764e3184537d42b528e718bd4886495eb45544</a><br><br>I'd say that's a nice example how <b>not</b> having lots of "powerful" library functions readily available can lead to a much better (smaller, more efficient) solution. 😏<br><br><a href="https://snac.bsd.cafe?t=x11" class="mention hashtag" rel="nofollow noopener" target="_blank">#X11</a> <a href="https://snac.bsd.cafe?t=emoji" class="mention hashtag" rel="nofollow noopener" target="_blank">#emoji</a> <a href="https://snac.bsd.cafe?t=keyboard" class="mention hashtag" rel="nofollow noopener" target="_blank">#keyboard</a> <a href="https://snac.bsd.cafe?t=development" class="mention hashtag" rel="nofollow noopener" target="_blank">#development</a><br>
Royce Williams<p>So ... due to an early obsession with historical BSD hashes ... I have significantly more bcrypt hashrate-per-watt cracking capacity than most solo shops. For bcrypt cost 12, it's about 34Kh/s straight wordlist -- the equivalent of about 17 4090s -- at only 1100W (these old Bitcoin FPGAs are very efficient for bcrypt specifically). And this capacity is intermittently idle, which is kinda a shame.</p><p>I haven't really put it out there as something I can help with if needed (outside of the Hashcat team). So ... feel free to ping me if you need bcrypts cracked/audited!</p><p>(Reasonable rates, but note that I do have a pretty firmly high bar for provenance / proof of authorization)</p><p>(Rat's nest of USB has been cleaned up a bit 😅)</p><p><a href="https://infosec.exchange/tags/bcrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bcrypt</span></a> <a href="https://infosec.exchange/tags/PasswordCracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordCracking</span></a> <a href="https://infosec.exchange/tags/hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashing</span></a></p>
IT News<p>Meta pays the price for storing hundreds of millions of passwords in plaintext - Enlarge (credit: Getty Images) </p><p>Officials in Ireland have fined... - <a href="https://arstechnica.com/?p=2053118" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2053118</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> <a href="https://schleuss.online/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://schleuss.online/tags/passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwords</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashing</span></a> <a href="https://schleuss.online/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>&amp;it</p>
Wervice 🦀<p>Can somebody help me with this? 😂<br> <br>While trying to do memory-hard hashing in <a href="https://fosstodon.org/tags/Bash" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bash</span></a> without using external tools aside from <a href="https://fosstodon.org/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a> I came up with this thing: <a href="https://pastebin.com/D3vqgW7N" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pastebin.com/D3vqgW7N</span><span class="invisible"></span></a><br>It seems to hash the password, but when using a fixed salt, the hash does not change, even with a different password.<br>Thus, I am not sure if this is trustworthy.</p><p>I'd be very glad if somebody could help me here 🙂 </p><p><a href="https://fosstodon.org/tags/hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashing</span></a> <a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
JMLR<p>&#39;Random measure priors in Bayesian recovery from sketches&#39;, by Mario Beraha, Stefano Favaro, Matteo Sesia.</p><p><a href="http://jmlr.org/papers/v25/23-1058.html" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">http://</span><span class="ellipsis">jmlr.org/papers/v25/23-1058.ht</span><span class="invisible">ml</span></a> <br /> <br /><a href="https://sigmoid.social/tags/hashing" class="mention hashtag" rel="tag">#<span>hashing</span></a> <a href="https://sigmoid.social/tags/priors" class="mention hashtag" rel="tag">#<span>priors</span></a> <a href="https://sigmoid.social/tags/prior" class="mention hashtag" rel="tag">#<span>prior</span></a></p>
CppCon<p>CppCon 2024 SESSION ANNOUNCEMENT: So You Think You Can Hash by <span class="h-card" translate="no"><a href="https://hachyderm.io/@ciura_victor" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ciura_victor</span></a></span></p><p><a href="https://cppcon2024.sched.com/event/1gZfQ/so-you-think-you-can-hash" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cppcon2024.sched.com/event/1gZ</span><span class="invisible">fQ/so-you-think-you-can-hash</span></a></p><p>Register now: <a href="https://cppcon.org/registration/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cppcon.org/registration/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/cpp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cpp</span></a> <a href="https://mastodon.social/tags/cplusplus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cplusplus</span></a> <a href="https://mastodon.social/tags/coding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coding</span></a> <a href="https://mastodon.social/tags/hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashing</span></a></p>
Royce Williams<p>When a target hashlist has a significantly lower percentage of cracks than expected, I've started calling the remaining/missing cracks "dark matter".</p><p>Some potential causes of cracking "dark matter":</p><ul><li><p>Site changed methodologies later: switched to a nested hash, added a pepper, HSM, true encryption layer, etc.</p></li><li><p>High number of automatically random-ish passwords: defaults, resets, bots, randomized on account lock, etc.</p></li><li><p>Complexity requirements higher than expected: high minimum length, etc.</p></li><li><p>Attacker (me) is missing key info: language, encoding, demographics, etc.</p></li></ul><p>What could other causes be?</p><p><a href="https://infosec.exchange/tags/Hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hashing</span></a> <a href="https://infosec.exchange/tags/PasswordCracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordCracking</span></a></p>
CppCon<p>CppCon 2024 SESSION ANNOUNCEMENT: So You Think You Can Hash by <span class="h-card" translate="no"><a href="https://hachyderm.io/@ciura_victor" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ciura_victor</span></a></span></p><p><a href="https://cppcon2024.sched.com/event/1gZfQ/so-you-think-you-can-hash" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cppcon2024.sched.com/event/1gZ</span><span class="invisible">fQ/so-you-think-you-can-hash</span></a></p><p>Register now: <a href="https://cppcon.org/registration/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cppcon.org/registration/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/cpp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cpp</span></a> <a href="https://mastodon.social/tags/cplusplus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cplusplus</span></a> <a href="https://mastodon.social/tags/coding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coding</span></a> <a href="https://mastodon.social/tags/hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashing</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://lea.pet/@lea" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>lea</span></a></span> <span class="h-card" translate="no"><a href="https://tilde.zone/@lunch" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>lunch</span></a></span> I mean, I could understand if for <a href="https://infosec.space/tags/FAT32" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FAT32</span></a> they'd set it to just below 2GiB per file since <a href="https://en.wikipedia.org/wiki/File_Allocation_Table#Maximal_sizes" rel="nofollow noopener" target="_blank">that's it's maximum</a>.</p><p>So yes, we <a href="https://transfem.social/notes/9vi30lki36ri013g" rel="nofollow noopener" target="_blank">should refuse to accomondate FAT32</a> or any other <em>legacy</em> filesystem of that matter because even <a href="https://infosec.space/tags/ext2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ext2</span></a> <a href="https://en.wikipedia.org/wiki/Ext2" rel="nofollow noopener" target="_blank">supports 16GiB file size</a> at the bare minimum...</p><p>As I'm confident <a href="https://lea.pet/notes/9vi2ywyzd6" rel="nofollow noopener" target="_blank">that 2012 low-end CPU</a> didn't even have hardware-acceleration, and <a href="https://infosec.space/tags/hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashing</span></a> on <a href="https://infosec.space/tags/BitTorrent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitTorrent</span></a> is solely done to prevent bitflips and enshure it's complete as malicious attacks like <a href="https://infosec.space/tags/HashCollisions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HashCollisions</span></a> on a torrent are rare and would likely fail due to exceeding the file size as per metadata...</p>
Philip Zucker<p>[New Blog Post] Hashing Modulo Theories <a href="https://philipzucker.com/hashing-modulo/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">philipzucker.com/hashing-modul</span><span class="invisible">o/</span></a> <a href="https://types.pl/tags/datastructures" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datastructures</span></a> <a href="https://types.pl/tags/hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashing</span></a></p>
Royce Williams<p>So <span class="h-card" translate="no"><a href="https://bird.makeup/users/solardiz" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>solardiz</span></a></span> presented a talk on "Password cracking: past, present, future" at OffensiveCon last week. Definitely worth a read - bringing his usual disciplined thinking to a topic he knows very well.</p><p>He includes both historical and taxonomical perspectives, both of which I appreciate. Apparently, one of the first <del>password-cracking</del> contests was in 1982? (This was a password <em>cracker</em> contest - seeking the best <em>cracking software</em>!)</p><p><a href="https://www.openwall.com/presentations/OffensiveCon2024-Password-Cracking/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openwall.com/presentations/Off</span><span class="invisible">ensiveCon2024-Password-Cracking/</span></a></p><p>[Will update post if video of the talk itself appears.]</p><p><a href="https://infosec.exchange/tags/passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwords</span></a> <a href="https://infosec.exchange/tags/hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashing</span></a> <br><a href="https://infosec.exchange/tags/PasswordCracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordCracking</span></a></p>
Jeroen Ruigrok van der Werven<p>Are your passwords in the green?</p><p><a href="https://www.hivesystems.com/blog/are-your-passwords-in-the-green" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hivesystems.com/blog/are-your-</span><span class="invisible">passwords-in-the-green</span></a></p><p>Really stop using MD5 already for passwords.</p><p><a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passwords</span></a> <a href="https://mastodon.social/tags/Hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hashing</span></a> <a href="https://mastodon.social/tags/MD5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MD5</span></a> <a href="https://mastodon.social/tags/Bcrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bcrypt</span></a></p>
HGPU group<p>Parallel Implementation of Lightweight Secure Hash Algorithm on CPU and GPU Environments</p><p><a href="https://mast.hpc.social/tags/CUDA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CUDA</span></a> <a href="https://mast.hpc.social/tags/PTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PTX</span></a> <a href="https://mast.hpc.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mast.hpc.social/tags/Hashing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hashing</span></a> <a href="https://mast.hpc.social/tags/Package" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Package</span></a></p><p><a href="https://hgpu.org/?p=29146" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">hgpu.org/?p=29146</span><span class="invisible"></span></a></p>