Readit News logoReadit News
Khoth commented on “This telegram must be closely paraphrased before being communicated to anyone”   history.stackexchange.com... · Posted by u/azeemba
BigJono · 5 days ago
> In this process, deletion rather than expansion of the wording of the message is preferable, because if an ordinary message is paraphrased simply by expanding it along its original lines, an expert can easily reduce the paraphrased message to its lowest terms, and the resultant wording will be practically the original message.

This bit has me perplexed. If you had a single message that you wanted to send multiple times in different forms, wouldn't compressing the message exponentially limit possible variation whereas expanding it would exponentially increase it? If you had to send the same message more than a couple of times I'd expect to see accidental duplicates pretty quickly if everyone had been instructed to reduce the message size.

I guess the idea is that if the message has been reduced in two different ways then you have to have removed some information about the original, whereas that's not a guarantee with two different expansions. But what I don't understand is that even if you have a pair of messages, decrypt one, and manage to reconstruct the original message, isn't the other still encrypted expansion still different to the original message? How does that help you decrypt the second one if you don't know which parts of the encrypted message represent the differences?

Khoth · 5 days ago
It's mostly talking about the case where someone receives an encrypted message which is intended to later be published openly. If it was padded by adding stuff, an attacker can try to reconstruct the original plaintext by removing the flowery adjectives, whereas if things were deleted the attacker doesn't know what to add.
Khoth commented on The reality of firearm suppressors vs. Hollywood   militaryrealism.blog/2025... · Posted by u/bookofjoe
saltcured · 2 months ago
I skimmed the article and the comments. Nobody seems to speak about the main reality here. The limited dynamic range of audio reproduction means that Hollywood has to stylize everything. The lighting and color mapping are by no means realistic in the imagery either, for similar reasons.

So, it's a bit like complaining that tinted windows work better to reduce sunlight on TV than in real life. Or conversely that people whispering in the movies are way too loud, since you shouldn't be able to hear it all the way at the back of the crowded theater.

Also, sound effects are very stereotyped in the media. They are nearly a symbolic code, not realism. Hollywood shoes don't sound like shoes. Hollywood beverages don't sound like beverages. Hollywood clothes don't sound like clothes. Hollywood sex doesn't sound like sex.

Also, these conventions were being established for worse sound systems in old theaters, TV, etc. You cannot reproduce actual gunshot sound experiences in a movie. They are already "silenced" just to fit into the playback environment. So what else can you do to portray a suppressed weapon after that? Of course, you'll need to reduce it even further to make it unambiguously different.

Edit to add: I recall how Dirty Harry's magnum got what seemed like a new sound effect at the time. Not only is the sound smeared out in time, it has a ragged edge like a clipped signal. It is reminiscent of the recorded sounds of space launches that were culturally widespread by then from the Apollo program.

Khoth · 2 months ago
It's not just about the actual sound effects, it's also the writing. The movie clip the article uses as an anchor shows people using silencers to have a gunfight in public with bystanders having no idea it was happening. That's not just hollywood sound direction, it's hollywood giving a completely wrong impression about how good silencers are and why they exist
Khoth commented on The Halting Problem is a terrible example of NP-Harder   buttondown.com/hillelwayn... · Posted by u/BerislavLopac
johanvts · 5 months ago
> NP-hard is the set all problems at least as hard as NP-complete

Im a bit confused by this. I thought NP-complete was the intersection of NP-hard and NP. Maybe this is stating the same?

Khoth · 5 months ago
NP-complete is indeed the intersection of NP-hard and NP.

If you can solve any NP-hard problem then you can solve any NP-complete problem (because you can convert any instance of an NP-complete problem to an NP-hard problem), so NP-hard problems are "at least as hard" as NP-complete problems.

(But an NP-hard problem might not be in NP, ie given a purported solution to an NP-hard problem you might not be able to verify it in polynomial time)

Khoth commented on NIST Interoperable Randomness Beacons   csrc.nist.gov/Projects/in... · Posted by u/diggan
Mistletoe · a year ago
> WARNING: Do NOT use Beacon generated values as cryptographic secret keys!

As a thought experiment what would happen if you did this?

Khoth · a year ago
Someone who knew or guessed that you were doing it could find your key very quickly by trying out every beacon value in the time range your key was generated in
Khoth commented on Is my vision that bad? No, it's just a bug in Apple's Calculator   martin.wojtczyk.de/2024/0... · Posted by u/wojtczyk
zelphirkalt · a year ago
Can this be true? Does the calculator have any irrational number? What if I enter PI * 2? Infinite precision, wouldn't that mean running until your RAM is full? Or would it simply work, because no irrational number is calculated to infinite (as many as the device could) digits and is therefore finite and can easily be multiplied?

Or another even simpler case: If division is infinite precision, and I enter (2/3) * X, does the calculator internally work with fractions? Otherwise it would have infinite digits to compute.

Khoth · a year ago
For 2/3, it does indeed work with fractions internally. For pi, it uses some floating point representation I think, you get about 50 digits.
Khoth commented on An abundance of Katherines: The game theory of baby naming   arxiv.org/abs/2404.00732... · Posted by u/cipcoder
adolph · a year ago
Is it paradoxical that family names (used by a group of people) are more differentiated than personal names (used by one person)?
Khoth · a year ago
Whether family names are more differentiated depends on where you live.

The USA has a wide variety, but there are also places like Vietnam where only a handful of family names are in common use and more than 30% of people are Nguyens.

Khoth commented on PuTTY vulnerability vuln-p521-bias   chiark.greenend.org.uk/~s... · Posted by u/aardvark179
cchance · a year ago
I mean the write up indicates you'd need access to the server side, or the pageant with the private key loaded, which both seem to be like... umm... at that point don't we have bigger issues?
Khoth · a year ago
Not sure about the pageant part, but it's a major problem when connecting to a compromised server leaks the client's private key.

(For example, if an attacker has compromised server A and you connect to it, they can now use your key to connect to server B which you also use)

Khoth commented on Ask HN: How are quantum computing companies making money?    · Posted by u/Gooblebrai
tqi · 2 years ago
As someone who has no idea of these things, I have always causally wondered what the effects of a breakthrough in quantum computing would be:

1) Does secure online browsing become impossible? 2) Does the entire crypto currency market evaporate?

Also would it be more advantageous / profitable for that country to publicize it or keep it a secret?

Khoth · 2 years ago
The search keyword to learn more is "post-quantum cryptography"

RSA and ECC cryptography could be broken, but (with a probably rocky transition period) we could move to other algorithms which are still secure.

Crytocurrency I'm not sure about.

I suspect probably keeping it secret - announcing it would push everyone to move from crypto you can break to crypto you can't.

Khoth commented on Wait, what's a bookmarklet?   thehistoryoftheweb.com/po... · Posted by u/Brajeshwar
Khoth · 2 years ago
I use one to get rid of fixed headers on a page

   javascript:(function()%20{%20var%20s,e,i,ee=document.getElementsByTagName('*');%20for(i=0;%20e=ee[i];%20i++)%20{%20s=getComputedStyle(e);%20if%20(s%20&&%20s.position%20==%20'fixed')%20e.style.position='static';%20}%20})();

Khoth commented on Hallucineted CVE against Curl: someone asked Bard to find a vulnerability   mastodon.social/@bagder/1... · Posted by u/martijnarts
tklinglol · 2 years ago
This is confusing - the reporter claims to have "crafted the exploit" using the info they got from Bard. So the hallucinated info was actionable enough to actually perform the/an exploit, even though the report was closed as bogus?
Khoth · 2 years ago
The thing they're they're reporting is that a CVE leaked and Bard found out about it before public disclosure.

Except that it's false because Bard made it up. There's no real curl exploit involved.

u/Khoth

KarmaCake day260November 4, 2016View Original