There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

programmer_humor

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

palmtrees2308 , in I just ask my problem bro...chill....

Just use phind.com you will get the relevant references. Chat got but better as it gives the source.

wise_pancake , in Review Please

Just one review request?

heavy , in Whoa there buddy, calm down

Where is this from? I don’t think exposing the key breaks most crypto algorithms, it should still be doing its job.

nulluser ,

r/whoosh 😉

heavy ,

No, really though, where’s it from?

CanadaPlus ,

The private key, or a symmetric key would break the algorithm. It’s kind of the point that a person having those can read it. The public key is the one you can show people.

heavy ,

Doesn’t break the algorithm though, you would just have the key and then can use the algorithm (that still works!) to decrypt data.

Also you’re talking about one class of cryptography, the concept of key knowledge varies between algorithms.

My point is an attacker having knowledge of the key is a compromise, not a successful break of the algorithm…

“the attacker beat my ass until I gave them the key”, doesn’t mean people should stop using AES or even RSA, for example.

cynar ,

The purpose is to access the data. This is a bypass attack, rather than a mathematical one. It helps to remember that encryption is rarely used in the abstract. It is used as part of real world security.

There are actually methods to defend against it. The most effective is a “duress key”. This is the key you give up under duress. It will decrypt an alternative version of the file/drive, as well as potentially triggering additional safeguards. The key point is the attacker won’t know if they have the real files, and there is nothing of interest, or dummy ones.

heavy ,

I appreciate the explaination, that’s a cool scheme, but what I saying is the human leaking the key is not the fault of the algorithm.

Everyone and everything is, on a very pedantic level, weak to getting their ass beat lol

That doesn’t make it crypt analysis

cynar ,

An encryption scheme is only as strong as its weakest link. In academic terms, only the algorithm really matters. In the real world however, implementation is as important.

The human element is an element that has to be considered. Rubber hose cryptanalysis is a tongue and cheek way of acknowledging that. It also matters since some algorithms are better at assisting here. E.g. 1 time key Vs passwords.

heavy ,

Very informative, I think people will learn from what you’re saying, but it doesn’t really matter to what I’m saying.

Yes, absolutely, consider the human element in your data encryption and protection schemes and implementations.

Beating someone with a pipe is a joke, but not really defeating an algorithm.

CanadaPlus ,

Okay, I don’t know if anyone was saying we should abandon encryption, though.

LinearArray , in Aaargh....my eyes......my eyes......
@LinearArray@programming.dev avatar

im scared

pewgar_seemsimandroid , in Open Source VS Company

the power of forking

clearleaf , in Variable Declaration

In godot engine you can put an underscore at the beginning of a variable to tell the linter to calm the hell down about it. But I don’t see why it’s such a crisis in the first place.

nickwitha_k ,

I agree, if talking about the warning. If talking about the unused var, Go won me over there. Unused vars are absolutely a class of software bug that can have implications in security, resource usage, and maintainability.

cookie_sabotage ,

The underscore is actually used to indicate the variable will not be used.

Wilzax , in Uh...oh...

The difference between theory and practice is greater in practice than in theory.

CrypticCoffee , in Variable Declaration

What IDE is this?

Luvon ,

It’s more language dependent than ide. Go for instance makes unused variables a compiler error (I believe) which means ides mark it as red immediately.

Ts/js can have eslint rules against unused variables but they will still usually compile or just run directly anyway.

Java doesnt error but can be set to warn you on them.

Abap doesn’t care and won’t tell you.

Your mileage will vary.

qaz ,

I’ve seen it with multiple IDE’s

Lexam , in You can certainly change it. But should you?

When you set the port speed to no negotiate.

cows_are_underrated , in Exam Answer

It is indeed wrong. The correct answer would be 24.

klisurovi4 , in As someone not in tech, I have no idea how to refer to my tech friends' jobs

I am partial to “code monkey”

On a serious note, I usually refer to myself as a developer or a software engineer when I wanna sound a bit more important.

mark , in CSS
@mark@programming.dev avatar

Yeah, because anything that isn’t a big new JavaScript framework is just way too complicated

jaemo ,

Somehow I doubt a lot of these opinions are steeped in the experience of building an HTML layout using tables, transparent gifs and inline width attributes. Shit was wild before CSS.

Ziglin , in STOP USING GITHUB

I agree with GitHub being bad, but the meme’s content is worse and I’m afraid that there are people who agree with it. I don’t like GitHub or Microsoft but since I get their stuff for free I do use but I’d love to use something that’s open and supports git properly.

0x0 , in As someone not in tech, I have no idea how to refer to my tech friends' jobs

Digital archæologist. Bitshifter.

Linkerbaan , in Songs about Vim
@Linkerbaan@lemmy.world avatar

Pull the plug - Death

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines