Comment Re:News? (Score 2) 24
Source ? Common wisdom is that Mark Zuckerberg's 3 kids are named Maxima, August, and Aurelia,
Source ? Common wisdom is that Mark Zuckerberg's 3 kids are named Maxima, August, and Aurelia,
The technology maintain a local precise time with two benefits:
- the distance from all true GPS satellites is now determinable, removing uncertainty; et least, one less GPS satellite is needed
- GPS jammers with grossly inaccurate time reference are weeded out
So my best guess is that countermeasure won't work against GPS jammers with an accurate time base, or smart enough to align their time base to other GPS satellites.
The company's research papers are there: https://corticallabs.com/resea...
I have yet to find something like a benchmark of the CL1 against more traditional approaches.
I candidly ask: what are the benefits of paying for Oracle Java when there's OpenJDK, as available effortlessly in tons of Linux distros?
I'm genuinely interested by actual use cases.
Quoting a recent "EMVCo Position Statement, Quantum Computing and EMV® Chip Cryptography"
> The most optimistic projections suggest that the earliest date that a cryptographically significant quantum computer could be built would be around 2040.
Source: an expert report commissioned by EVMco, dated 2024/03/08, marked published 2024/09, online since 2024/12/17 at https://www.emvco.com/resource... (requires click-thru approval of license terms). I second their opinion.
Not only is it unknown to the FAA who botched the remounting of the door plug and forgot the 4 bolts. It's not known, at least publicly, why that particular door plug is the one that was remounted.
Fact: The door plug that fell out from the sky bears the marking "LINE UNIT:8799" (source: press photo).
Fact: Tthe NTSB preliminary report states the accident aircraft has Fuselage Line 8789 (notice the one-digit discrepancy). And fuselage Line 8799 is that of a later aircraft delivered a month later.
Hence, the door that fell was manufactured with the intention of fitting it to an aircraft earlier in the assembly line (or is marked wrong).
We also know from a whistleblower that at one point, the door seal was found to be damaged. And no replacement door seal was immediately available. That creates an incentive to swap the door, solving the seal problem, which would perfectly fit the the above evidence.
It's common practice in manufacturing to “cannibalize” parts up in the assembly line to finish the unit that's next to be delivered. I know no reason why it would have been objectionable in the circumstance, subject to
- proper paperwork documenting the swap
- remounting the screws properly
- duly inspecting that.
But it looks like these three steps have have been skipped. And that should be a big deal.
The February 18, 2022 entry of Web3isgoingreat already documented Zoe was in trouble.
"Authorities performed nine separate raids targeting Generación Zoe"
https://web3isgoinggreat.com/?...
That's more meat for this public service: https://web3isgoinggreat.com/
According to WetFinger, 1/3 of the electricity consumed by computers with pay-for antivirus software is for the antivirus to do it's things: slow down the machine to a crawl, and emits messages aimed at justifying the purchase of a renewal or upgrade.
This new feature will dramatically increase that energy share, thus hastening the certain demise of humanity.
I design Smart-Card based payment systems. Like many applied cryptographers, I believe cryptography and computers are antagonist to voting security if we want to keep vote secret.
The most important goals of a voting system are that
1) voters will trust the result
2) massive fraud by few individuals is impossible
3) voting under duress or bribery can not get massive.
Requirement 3 is why vote is cast in the secret of a booth, and shall remain secret. Experience has proved secrecy is important, and straight antagonist with vote-by-mail, and by extension vote-at-home or vote-on-one's-mobile.
And once we accept most voters should vote secretly (with duly justified exception for vote by proxy and remote locations), we just do not know a cryptography-based system that meets either 1 or 2.
The reasonable layperson does not understand how cryptography and computers really work, thus is more likely to trust their cote is counted when they have put a paper in an envelope, have seen it fall in a transparent box, and have confidence that it is watched by observers until and when the envelopes are opened and hand-counted locally (and counts at each voting places made public, which makes alteration of these counts detectable by observers). Sure, this is subject to local manipulation. But that can't lead to massive undetected fraud on a large scale.
And the reasonable layperson is right! Cryptography does not guard against the risk that the voter's intention is disclosed and/or changed between the button pressed and the computerized treatment made of that, by way of a hardware or software modification made by the makers or guardians of a voting device. The more knowledgeable, the more reluctant security experts are to tell no such disclosure or alteration is possible.
No countermeasure exists against "we spy on the voting machine to know how you voted, so you'd better vote as we instruct"; and that can actually be true for virtually all voting machine design (by Van Eck phreaking, and so many other ways). And voters can't check the vote they cast on a machine are counted in the right direction (for any verification mean could be used to prove how the vote was cast, making bribery/threatening effective), unless the check they make is from an unalterable audit trail (like paper) that ultimately is what defines the vote cast.
Universal Windows Platform (UWP) apps where supposed to run on Windows 10 Mobile. Do they remain relevant? Have they ever been?
I wonder what supports:
in fact because of this [key scheduling] weakness, AES-256 may be even less secure than AES-192
No attack that I know makes AES-256 weaker than AES-192, or anything close to that (unless some rounds are trimmed).
Beside, attacks on AES key scheduling make the assumption that the adversary can impose some transformation of the key that she chooses, when the standard and practically relevant assumption is that the adversary can not influence the choice of key. Under that assumption, as far as I know, all three variants of AES are within 3 bit of its original security goal.
The Naked Ape (a Zoologist's Study of the Human Animal), by Desmond Morris, 1967.
The Selfish Gene, by Richard Dawkins, 1976.
These give clues about what we are, and why.
I like TAOCP, a lot; mainly, because the material is so coherent, precise, well justified, and understandable enough. I spent many weeks reading sections of TAOCP; especially volume 2, on Semi-numerical algorithms; my copy has several post-it marks on techniques useful in my field (applied cryptography): wide multiplication algorithms, modular arithmetic including exponentiation, statistical tests.
I also had significant uses of volume 1 (Fundamental Algorithm), which covers things such a tree, and hash tables; even purchasing the third edition, on top of the second.
That said,
- _reading_ TAOCP from start to end is not something to consider lightly; perhaps if one has a year to spend.
- I never caught on the use of MIX in some programs; I just skip this, and advise contemporary readers to do so, even if that's missing a part of the beauty.
Real Programmers don't write in FORTRAN. FORTRAN is for pipe stress freaks and crystallography weenies. FORTRAN is for wimp engineers who wear white socks.