There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

Primarily0617

@[email protected]

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Primarily0617 ,

y’all don’t understand we’re going by a dangerous route

who knew that pre-game handshakes were load bearing when it came to the apparent house of cards that is modern society

Primarily0617 ,

bruh what the fuck are you talking about

latest batch f35s are cheaper than most 4th and 4.5th generation fighters

Primarily0617 ,

too late coward my pants already need changing

Primarily0617 ,

I have yet to find a game that doesn't run

At this point I don't even check before buying

Primarily0617 ,

you have to limit it somewhere or you're opening yourself up for a DoS attack

password hashing algorithms are literally designed to be resource intensive

Primarily0617 ,

Incorrect.

They're designed to be resource intensive to calculate to make them harder to brute force, and impossible to reverse.

Some literally have a parameter which acts as a sliding scale for how difficult they are to calculate, so that you can increase security as hardware power advances.

Primarily0617 ,

It depends on the hash. E.g., OWASP only recommends 2 iterations of Argon2id as a minimum.

Yes, a hashing function is designed to be resource intensive, since that's what makes it hard to brute force. No, a hashing function isn't designed to be infinitely expensive, because that would be insane. Yes, it's still a bad thing to provide somebody with a force multiplier like that if they want to run a denial-of-service.

Primarily0617 , (edited )

Argon2 has parameters that allow you to specify the execution time, the memory required, and the degree of parallelism.

But at a certain point you get diminishing returns and you're just wasting resources. It seems like a similar question to why not just use massive encryption keys.

Primarily0617 ,

but if you feel bad you can just eat more cheese to help

Primarily0617 ,

Calories are required for your body to function

not mine 🙂

Primarily0617 ,

did capitalism do that, or did technologies like aircraft and refrigeration do that?

why would economies of scale not exist under a different socio-economic system?

Primarily0617 ,

Because the focus wouldn’t be on profit just for profit’s sake

what socioeconomic system has existed where increased productivity was viewed as a bad thing?

e.g.:

  • pure feudalism would've led to economies of scale because it would make the king of the castle wealthier.
  • any kind of socialism with a centrally planned economy would've led to economies of scale because it enables the government to more easily meet the needs of the people.
  • even pure marxist communism probably would've led to economies of scale eventually because any communities that worked together on a global scale would've been more prosperous for their community members, which is still a goal of the system

The technologies just allowed it

or in other words, their invention led to it, which was the original quote I was responding to

Plus, technologies are not sentient, you can’t blame a technology…

  • socio-economic systems aren't sentient either
  • nobody's "blaming" a technology—there isn't even really a consensus in this thread on whether economies of scale leading to increased meat consumption is a good or bad thing
Primarily0617 ,

The point is that mass factory farming is the reason that meat is cheap now, and one of the technologies that's enabled mass factory farming is refrigeration.

Primarily0617 ,

Humans evolved to eat animals.

humans also evolved to die from cholera before the age of 3 what's your point

B12 is an essential vitamin whose primary source is meat and dairy

so add b12 to foods, or take b12 supplements

I am child free

not having children because you never wanted children isn't an argument unless you avoided having them specifically for the climate

you're allowed to eat meat, but can we please stop with all the limp-wristed excuses for why it's actually morally justifiable and just own it?

Primarily0617 ,

*implicitly comparing the treatment of Jews during the holocaust to the treatment of cattle today

also, you can compare two things without equating them

I think if you actually cared about the words you wrote, you wouldn't have used them as the basis of a lazy strawman to win an argument on the internet against veganism

Primarily0617 ,
Primarily0617 ,

Milk is a staple of many American diets

North America systemically over-consumes, hence its obesity crisis.

the 90 calories you are missing will be made up elsewhere in your diet

this doesn't accurately represent a person's relationship with food

Primarily0617 ,

is not a comparison in terms of scale of harm

I'm still missing the part where it's equating Jews to farm animals.

Primarily0617 ,

No it wasn't.

Eating meat isn't the same thing as rationalising that it isn't contributing.

Also, it's now perfectly possible to exist in society without eating meat at all. The evidence being all the people who go about their lives doing exactly that.

Primarily0617 ,

You are factually incorrect on point 2

So I can eat 2000 calories in pure sugar and feel full for the whole day?

point 1 was already addressed in my comment

You said it didn't matter in America but that it does matter globally, but we're not talking about globally, because we're talking about how milk forms part of the typical American diet.

That's not addressing anything.

Primarily0617 ,

You're the one putting scale in there

Is it possible to safely check for certain characters in a password?

Basic cyber security says that passwords should be encrypted and hashed, so that even the company storing them doesn’t know what the password is. (When you log in, the site performs the same encrypting and hashing steps and compares the results) Otherwise if they are hacked, the attackers get access to all the passwords....

Primarily0617 ,

that doesn't explain the scenario described in the post

Primarily0617 , (edited )

There's a security exchange thread on it here

It looks like there are certain kinds of algorithms you can run that give you this property.

Also, I've seen this when you have an alternate form of authentication like a password you type in full, or an existing session token. In those scenarios, you could probably use some sort of symmetric key encryption to encrypt the secondary password with the primary password / session token in such a way that you aren't storing the key and can't decrypt it, but that you can check specific digits on command.

Primarily0617 ,

Less secure if you come at it from the perspective of cracking the password, but probably more secure in real-world terms.

If you type in your bank password and somebody's compromised your browser, they now have your entire password.

If you type in the third, fourth and eighth digits and somebody's compromised your browser, they still can't access your account.

Obviously full 2FA is probably better, but

  • A bank requiring a smartphone to bank with them is probably a no-go
  • A bank probably has to deal with some of the least technical users that are out there

If it's too hard for certain users to engage with the system correctly, they'll try to sneak around it in ways that could compromise their security more than if the bank had just gone with the specific digits thing in the first place.

Primarily0617 ,

If you have the password hashes, you almost certainly have the salts. Salts prevent the same password used by different users having the same hash, but if you're bruteforcing, they don't really add to complexity.

Bruteforcing 2 characters + a salt is computationally the same as bruteforcing 2 characters.

Primarily0617 ,

A bunch of European banks.

Primarily0617 ,

They all do it. It's perfectly secure if you don't implement it in a naive way.

No, they aren't storing your password in plaintext.

Primarily0617 ,

There's a security stack exchange on this exact question here.

Storing your credentials in plaintext would be insane, illegal, and would never pass any kind of audit.

Primarily0617 ,

"mercenary" is a strong word to describe what is a essentially a "deniable" arm of the state

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines