There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

programmer_humor

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

dullbananas , in Daylight saving creator left the chat....
@dullbananas@lemmy.ca avatar
go_go_gadget , in Computer components cheat sheet

We don’t talk about bubble jet.

BlackRoseAmongThorns , in Three monitors, and i feel insulted

I had my PC built for me while all i had to do was specify parts, tried to get fans with no light just to avoid this, got the almost exact model but with lights.

Now if i use my PC at night my room glows pink (not for any particular reason besides it being the most dominant in my rainbow led fans)

Username ,

It’s not even controllable RGB? Just shitty rainbow all the time?

BlackRoseAmongThorns ,

There’s an extra device which is required to control them, yes i already tried the bios.

Basically yes, rainbow, at least it’s not rotating and is just a static rainbow circle.

spatialdestiny , in Computer components cheat sheet

Now do software concepts like Bitcoin, machine learning, and blockchain.

go_go_gadget ,

Bitcoin: An excel spreadsheet a bunch of people agree on.
Machine Learning: Electrons in a room banging on typewriters.
Blockchain: A marketing term for linked lists.

nifty ,
@nifty@lemmy.world avatar

I think you switched blockchain and bitcoin

passepartout , in Rebase Supremacy

I like the idea of it and there were times i used it correctly, but most of the time i do it wrong i guess.

SpaceNoodle , in As someone not in tech, I have no idea how to refer to my tech friends' jobs

“Software Development Engineer”

FellowEnt , in Computer components cheat sheet

I love my inkjet. It’s so nice to be able to do my own high quality prints for the wall and for friends.

Korne127 , in Daylight saving creator left the chat....
@Korne127@lemmy.world avatar

There are some time libraries which actually work pretty well and allow you to manage things like Timezones. And then there are some abominations beyond my compression…

Opisek ,

Have you tried 7zip?

asterfield , in Gamedev is Easy

This code is going to make me have a stroke. What language is this? Why does the game object have an internal bug tracker implementation? Does the game force itself into wishlists? If yes, why stop at 7000?

I know I shouldn’t get so mad at a random internet joke but this one makes me twitchy.

spez , in Dad has the chops to be a project manager.

Cool

JATtho , in You can certainly change it. But should you?

<span style="color:#323232;">volatile int blackhole;
</span><span style="color:#323232;">blackhole = 1;
</span><span style="color:#323232;">const int X = blackhole;
</span><span style="color:#323232;">const int Y = blackhole;
</span>

Compiler is forbidden to assume that X == 1 would be true. It’s also forbidden to assume that X == Y. const just means the address and/or the data at the address is read only. const volatile int* const hwreg; -> “read only volatile value at read only address hwreg”. Compiler can assume the hwreg address won’t magically change, but can’t assume the value read from that address won’t.

palmtrees2308 , in I just ask my problem bro...chill....

Just use phind.com you will get the relevant references. Chat got but better as it gives the source.

wise_pancake , in Review Please

Just one review request?

heavy , in Whoa there buddy, calm down

Where is this from? I don’t think exposing the key breaks most crypto algorithms, it should still be doing its job.

nulluser ,

r/whoosh 😉

heavy ,

No, really though, where’s it from?

CanadaPlus ,

The private key, or a symmetric key would break the algorithm. It’s kind of the point that a person having those can read it. The public key is the one you can show people.

heavy ,

Doesn’t break the algorithm though, you would just have the key and then can use the algorithm (that still works!) to decrypt data.

Also you’re talking about one class of cryptography, the concept of key knowledge varies between algorithms.

My point is an attacker having knowledge of the key is a compromise, not a successful break of the algorithm…

“the attacker beat my ass until I gave them the key”, doesn’t mean people should stop using AES or even RSA, for example.

cynar ,

The purpose is to access the data. This is a bypass attack, rather than a mathematical one. It helps to remember that encryption is rarely used in the abstract. It is used as part of real world security.

There are actually methods to defend against it. The most effective is a “duress key”. This is the key you give up under duress. It will decrypt an alternative version of the file/drive, as well as potentially triggering additional safeguards. The key point is the attacker won’t know if they have the real files, and there is nothing of interest, or dummy ones.

heavy ,

I appreciate the explaination, that’s a cool scheme, but what I saying is the human leaking the key is not the fault of the algorithm.

Everyone and everything is, on a very pedantic level, weak to getting their ass beat lol

That doesn’t make it crypt analysis

cynar ,

An encryption scheme is only as strong as its weakest link. In academic terms, only the algorithm really matters. In the real world however, implementation is as important.

The human element is an element that has to be considered. Rubber hose cryptanalysis is a tongue and cheek way of acknowledging that. It also matters since some algorithms are better at assisting here. E.g. 1 time key Vs passwords.

heavy ,

Very informative, I think people will learn from what you’re saying, but it doesn’t really matter to what I’m saying.

Yes, absolutely, consider the human element in your data encryption and protection schemes and implementations.

Beating someone with a pipe is a joke, but not really defeating an algorithm.

CanadaPlus ,

Okay, I don’t know if anyone was saying we should abandon encryption, though.

LinearArray , in Aaargh....my eyes......my eyes......
@LinearArray@programming.dev avatar

im scared

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines