Comments

This profile is from a federated server and may be incomplete. Browse more on the original instance.

charonn0, to programmer_humor in Programmer tries to explain binary search to the police
@charonn0@startrek.website avatar

Part of my job is to review security footage for reported incidents.

If there is a long-lasting visual cue that the event has or has not happened yet (e.g. a window is either broken or not), then a binary search is very useful.

If the event lasts only a moment and leaves no visual cue (e.g. an assault), then binary search is practically useless.

charonn0, (edited ) to asklemmy in What's something you're proud of doing?
@charonn0@startrek.website avatar

Remember Valentine’s day 2004, when San Francisco county started issuing marriage licenses to same-sex couples?

Thousands of couples showed up. Some from the other side of the planet, some from the other side of town. The County Clerk was overwhelmed and there weren’t nearly enough wedding officiants to keep up. So they put out a call for volunteers to be deputized by the Clerk as county marriage commissioners. I volunteered and officiated at dozens of ceremonies at city hall.

Still have my official commission hanging on my wall.

charonn0, (edited ) to privacy in the encryption keys, why can't the government just sneak on them?
@charonn0@startrek.website avatar

SSL/TLS, the “S” in HTTPS, and other network encryption protocols such as SSH, use a technique called a Diffie-Hellman key exchange. This is a mode of cryptography where each side generates two keys: a public half and a private half. Anything encrypted with the public half is only decryptable by the associated private half (and vice versa).

You and Youtube only ever exchange the public halves of your respective key pairs. If someone snoops on the key exchange all they can do is insert spoofed messages, not decrypt real ones.

Moreover, the keypairs are generated on the fly for each new session rather than reused. This means that even a future compromise of youtube won’t unlock old sessions. This is a concept called forward secrecy.

Message spoofing is prevented by digital signatures. These also use the Diffie-Hellman principle of pairs of public/private keys, but use separate longer-term key pairs than those used with encryption. The public half of youtube’s signing key, as presented by the server when you connect to it, has to be digitally signed by a well-known public authority whose public signing key was shipped with your web browser.

charonn0, to linux in SSH protects the world’s most sensitive networks. It just got a lot weaker
@charonn0@startrek.website avatar

Even the researcher who reported this doesn’t go as far as this headline.

“I am an admin, should I drop everything and fix this?”

Probably not.

The attack requires an active Man-in-the-Middle attacker that can intercept and modify the connection’s traffic at the TCP/IP layer. Additionally, we require the negotiation of either ChaCha20-Poly1305, or any CBC cipher in combination with Encrypt-then-MAC as the connection’s encryption mode.

[…]

“So how practical is the attack?”

The Terrapin attack requires an active Man-in-the-Middle attacker, that means some way for an attacker to intercept and modify the data sent from the client or server to the remote peer. This is difficult on the Internet, but can be a plausible attacker model on the local network.

terrapin-attack.com

charonn0, to lemmyshitpost in Train your replacement on your way out.
@charonn0@startrek.website avatar

Reminds me of Isaac Asimov’s best short story ever.

www.thelastquestion.net

charonn0, to science_memes in *screams exestentially*
@charonn0@startrek.website avatar

I have a friend who’s an artist and has sometimes taken a view which I don’t agree with very well. He’ll hold up a flower and say “look how beautiful it is,” and I’ll agree.

Then he says “I as an artist can see how beautiful this is but you as a scientist take this all apart and it becomes a dull thing,” and I think that he’s kind of nutty. First of all, the beauty that he sees is available to other people and to me too, I believe. Although I may not be quite as refined aesthetically as he is … I can appreciate the beauty of a flower.

At the same time, I see much more about the flower than he sees. I could imagine the cells in there, the complicated actions inside, which also have a beauty. I mean it’s not just beauty at this dimension, at one centimeter; there’s also beauty at smaller dimensions, the inner structure, also the processes.

The fact that the colors in the flower evolved in order to attract insects to pollinate it is interesting; it means that insects can see the color. It adds a question: does this aesthetic sense also exist in the lower forms? Why is it aesthetic? All kinds of interesting questions which the science knowledge only adds to the excitement, the mystery and the awe of a flower. It only adds. I don’t understand how it subtracts.

-Richard Feynman

charonn0, to risa in Space is 2D, right?
@charonn0@startrek.website avatar

This is why I appreciate the scene in Undiscovered Country where Kronos One glides into view, seeming to align itself to the Enterprise’s orientation.

youtu.be/AkqZja1IBfk?t=129

charonn0, to risa in You can always count on Garak ...or can you?
@charonn0@startrek.website avatar

The actor who played Garak is on record saying that he played the character as bi, with a crush on Bashir.

charonn0, to asklemmy in So is the US slipping into Civil War?
@charonn0@startrek.website avatar

These would be ‘rebel’ states are among the poorest and most heavily dependent on federal subsidies. They need the US more than the US needs them.

charonn0, to linux in Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack
@charonn0@startrek.website avatar

As its name suggests, LogoFAIL involves logos, specifically those of the hardware seller that are displayed on the device screen early in the boot process, while the UEFI is still running. Image parsers in UEFIs from all three major IBVs are riddled with roughly a dozen critical vulnerabilities that have gone unnoticed until now. By replacing the legitimate logo images with identical-looking ones that have been specially crafted to exploit these bugs, LogoFAIL makes it possible to execute malicious code at the most sensitive stage of the boot process, which is known as DXE, short for Driver Execution Environment.

So, does disabling the boot logo prevent the attack, or would it only make the attack obvious?

charonn0, to risa in Just get a bigger fence
@charonn0@startrek.website avatar

Which is a real thing in canon. Bajor’s application was put in jeopardy when they briefly reinstated a caste system, which violated Federation equality rules.

charonn0, to piracy in Film studios demand IP addresses of people who discussed piracy on Reddit
@charonn0@startrek.website avatar

tl;dr: The users’ comments say that a certain ISP is pirate-friendly. Studios want to use the comments against the ISP (not the users).

charonn0, to historyporn in Pro-segregation rally in Arkansas, USA, 1960s
@charonn0@startrek.website avatar

It just goes to show how empty and dishonest racist rhetoric really is.

charonn0, to chat in How much does a creator's worldview influence whether you use their tech or consume their media?
@charonn0@startrek.website avatar

I refuse to use the Brave browser, and I was prepared to abandon Firefox, over then-CEO Brendan Eich’s $1000 donation in support of California’s proposition 8 (banning same-sex marriage). I will never forgive the supporters of that proposition. I will not knowingly support their businesses.

I’ve lost all respect for Scott Adams (of the Dilbert comic strip) and Kelsey Grammar (Frasier actor). Their continued support for Donald Trump is damning.

charonn0, (edited ) to risa in Have you been injured? Call Gowron Law.
@charonn0@startrek.website avatar

I was framed for assassinating a politician and sent to Rura Penthe. Gowron got me $5,000!

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #