Readit News logoReadit News
cedws commented on Reducing "gate" counts for Kyber-512 contradicting NIST's calculation   blog.cr.yp.to/20231023-cl... · Posted by u/nabla9
cedws · 2 years ago
There was a post recently about suspicion of NIST, specifically from Daniel Bernstein. We also have reason to believe there was funny business around Dual_EC_DRBG.

If NIST really is up to no good on behalf of US intelligence agencies, it's reasonable to believe they'd be doing everything they can to prevent strong post-quantum crypto.

Also, here's an idea I had: let's say you wrapped a plaintext in three different encryption algorithms authored in adversarial countries. Even if you assume all three are backdoored by their creators, you'd have something that could only be unwrapped if the three adversarial countries worked together. Is there anything out there that does this?

c7DJTLrn commented on Show HN: Use an EEPROM as Programmable Logic   github.com/DusteDdk/eepro... · Posted by u/dusted
Joker_vD · 2 years ago
Yes. See [0], and especially the very last link [1] in that comment (it's a very nice write-up on exactly how to do that).

[0] https://news.ycombinator.com/item?id=37548907

[1] https://bailleux.net/pub/ob-project-gray1.pdf

c7DJTLrn · 2 years ago
So cool, thanks.
c7DJTLrn commented on Cortical Labs: "Human neural networks raised in a simulation"   corticallabs.com/... · Posted by u/pr337h4m
c7DJTLrn · 2 years ago
This is kind of the plot of the third season of Sword Art Online.
cedws commented on Show HN: Use an EEPROM as Programmable Logic   github.com/DusteDdk/eepro... · Posted by u/dusted
madmulita · 2 years ago
It is not fast but very interesting:

https://www.youtube.com/@DrMattRegan/

cedws · 2 years ago
Cool channel, much of it over my head, thanks.
c7DJTLrn commented on Meta reveals serverless platform processing trillions of function calls a day   engineercodex.substack.co... · Posted by u/thunderbong
kristiandupont · 2 years ago
I can't speak to what is going on but one thing I've heard that makes things difficult for at least the frontend teams is that they are battling ad blockers. In order to work around them, they create incredibly obfuscated HTML that no one would normally ever create.
c7DJTLrn · 2 years ago
And this is where some of the greatest, most educated minds in computing are going. What a waste.
cedws commented on Show HN: Use an EEPROM as Programmable Logic   github.com/DusteDdk/eepro... · Posted by u/dusted
cedws · 2 years ago
Could this be used to build a super minimalistic Ben Eater style CPU?
c7DJTLrn commented on With Firefox on X11, any page can pastejack you anytime (middle button paste)   openwall.com/lists/oss-se... · Posted by u/jackdoe
c7DJTLrn · 2 years ago
I am surprised that Firefox freely allows access to the clipboard. I'm using Brave and there's an explicit permission for it that is disallowed by default.
c7DJTLrn commented on Banging errors in Go   flak.tedunangst.com/post/... · Posted by u/ingve
c7DJTLrn · 2 years ago
Please no.

Go is designed to be easy to read and easy to write. err != nil is not hard to read. If you don't like the repetition, it simply isn't the language for you. I'm perfectly happy with how Go does it. I do not want the language morphing into another Rust.

c7DJTLrn commented on Ask HN: Did any of you first encounter programming through Scratch?    · Posted by u/MarcScott
c7DJTLrn · 2 years ago
2000s kid, I first used something similar to LOGO at school, if you can consider that programming. I initially taught myself programming/scripting by writing Windows batch scripts. Scratch was introduced in my teens at school but by then I was far beyond block programming.

I hated Scratch. I saw it as childish and simplistic. I wanted to play with the big boy stuff.

c7DJTLrn commented on Linux runtime security agent powered by eBPF   github.com/Exein-io/pulsa... · Posted by u/ExeinTech
forward1 · 2 years ago
Gotta love security theater like this:

    curl --proto '=https' --tlsv1.2 -sSf https://raw.githubusercontent.com/Exein-io/pulsar/main/pulsar-install.sh | sh
So secure, I mean it's forcing https AND tls1.2 - maximum security! Especially when you just pipe a random script into shell.

Also, no information on its authors, who audited the code, what makes it "secure" enough to warrant giving an administrative entitlement over my system. Hard pass.

c7DJTLrn · 2 years ago
Shell security is a joke anyway, there's plenty of other things to be cynical about than an install script. Such as how I can elevate privileges on your machine by phishing your password with a fake sudo binary in $PATH.

u/c7DJTLrn

KarmaCake day4827December 5, 2019View Original