Nieśmiały cybernetyk potężne ekstrema
Poznawał, kiedy grupy unimodularne
Cyberiady całkował w popołudnie parne,
Nie wiedząc, czy jest miłość, czy jeszcze jej nie ma.
Precz mi, precz, Laplasjany z wieczora do ranka,
I wersory wektorów z ranka do wieczora!
Bliżej, przeciwobrazy! Bliżej, bo już pora
Zredukować kochankę do objęć kochanka!
On drżenia wpółmetryczne, które jęk jednoczy,
Zmieni w grupy obrotów i sprzężenia zwrotne,
A takie kaskadowe, a takie zawrotne,
Że zwarciem zagrażają, idąc z oczu w oczy!
Ty, klaso transfinalna! Ty, silna wielkości!
Nieprzywiedlne continuum! Praukładzie biały!
Christoffela ze Stoksem oddam na wiek cały
Za pierwszą i ostatnią pochodną miłości.
Twych skalarnych przestrzeni wielolistne głębie
Ukaż uwikłanemu w Teoremat Ciała,
Cyberiado cyprysów, bimodalnie cała
W gradientach, rozmnożonych na loty gołębie!
O, nie dożył rozkoszy, kto tak bez siwizny
Ani w przestrzeni Weyla, ani Brouwera
Studium topologiczne uściskiem otwiera,
Badając Moebiusowi nie znane krzywizny!
O, wielopowłokowa uczuć komitanto,
Wiele trzeba cię cenić, ten się dowie tylko,
Kto takich parametrów przeczuwając fantom,
Ginie w nanosekundach, płonąc każdą chwilką!
Jak punkt, wchodzący w układ holonomiczności,
Pozbawiany współrzędnych zera asymptotą,
Tak w ostatniej projekcji, ostatnią pieszczotą
Żegnany - cybernetyk umiera z miłości.
Did somebody made an experiment like that?
As far as we know anti-atoms (antihydrogen in this case) are as stable as normal atoms.
To the point where it creates interesting questions -- if antiatoms are exactly as normal atoms, why we have abundance of normal matter but not antimatter?
So, when you're rearchitecting a tank today, you're going to protect it against the now-dominant threats.
At its base, a tank is a propulsion system, a gun, and a set of survivability options.
The first two are always going to be relatively expensive, in quantity. So the last gets defined and scaled to meet the expected threat.
Ie mobile platforms that are essentially defenceless on their own but carry large armament of drones and other electronic devices inside enemy territory that is meant to quickly take over surrounding space (surface and overhead) and do quick job of neutralising various threats like enemy personnel, drones, etc.
But I am not sure about that. Planes require a landing strip to start from and large hangars to store them and that drove the basic form of aircraft carrier.
There is no such limitation for electronic equipment and small drone carriers travelling on land. And I think, rather than presenting a single high value target to the enemy, it makes sense to have a lot of specialised units functioning as one through information systems that cannot be disabled with a single successful strike.
120mm cannon rounds are cheaper and more plentiful than guided missiles, which means a lot.
That said, it’s getting harder and harder to understand a scenario in which tanks can be employed successfully against a motivated, competent defender with plentiful ATGM and loitering munition stocks.
The whole point of tank, as the word suggests, is to be able to survive enemy fire.
With proliferation of easy to carry weapons that can pierce any tank it is largely relegated to being heavy, costly and fragile mobile cannon that needs a lot of support to stay alive. There are much better devices that can fill those roles.
You should no longer assume that you can ambush anything with your tanks -- with live overhead feed it is easy to spot any tanks encroaching on your position and place any antitank in the right spot.
And then you have drones that you can basically point and shoot any tank from.
I am pretty sure this is the last war where we see large number of tanks involved. Every country that is watching this is click spamming to buy as many drones as possible.
You made up a number with no grounding in reality because of your bias due to being "general public".
For corporate services it is actually quite common to use client certificates and mutual auth. Also popular with VPNs.
You might not be aware of this because corporations do not want to deal with people who do not know or can be forced to know how to generate signing request.
This is different when you control both the service and the users of the service and you have something valuable to protect.
As an example, I worked with credit card terminals and these used mutual auth with properly managed client certificates.
You wouldn't call DOS on all terminals and ATMS "insignificant".
TLS server implementations should be aborting the TLS connection for violating the TLS Handshake state machine if a client attempts to send a client certificate when it wasn't requested.
So while this bug affects both clients and servers, 100% of clients are parsing the server's TLS cert during the TLS handshake, but less than ~1% of servers are parsing a client's certificate during a handshake.
There is a huge number of public facing services that implement mutual auth and all those are potentially vulnerable to DOS. While clients can just decide to not connect to a web service that causes their browser to malfunction (and why have you connected there in the first place?), services are usually not at liberty to ignore a client at this stage.
So yes, those servers that do request client certificate are targets and my point still stands that servers are much more affected than the clients.
What would be an affected client? You keep connecting to this infected website that causes your browser to die? Somebody embedded some tracking on their page that now points to an infected website? Everybody will just move on and it is hard to say you are very much affected by this problem.
Whereas if you are a service and you are affected you absolutely need to implement a fix.
Actually, it is the opposite.
You seem to be unaware of the fact that servers do receive certificates from the clients which are then parsed.
Which is already mentioned in the advisory document:
"Thus vulnerable situations include:
- TLS clients consuming server certificates
- TLS servers consuming client certificates <---- here
- Hosting providers taking certificates or private keys from customers
- Certificate authorities parsing certification requests from subscribers
- Anything else which parses ASN.1 elliptic curve parameters"[1] https://oceanwide-expeditions.com/blog/the-ancient-fossil-fo...
We are all dependant on very fragile balance of various mechanisms that we do not fully understand.
For example, European climate depends very much on the mass of warm water transported by Gulfstream. Europe would be basically north Canada if not for all that warm water and precipitation that comes with it. But we also know that this stream itself depends on the water cooling up north and sinking to complete the cycle. If the water can't cool the cycle will be broken and Europe may suddenly change the climate dramatically at an astonishing rate.
I am not worried about plant and animal life -- these will migrate or adapt. Nature has always found a way in the past.
What I am worried is human toll, masses of people affected by rapid climate change that are unable to fend for themselves.