Readit News logoReadit News

Deleted Comment

makira commented on New proof dramatically compresses space needed for computation   scientificamerican.com/ar... · Posted by u/baruchel
svat · 8 months ago
To be clear, this was/is a statement about the worst case, not every problem. So it may be clearer to rephrase your sentence as:

For nearly 50 years theorists believed that there exist problems taking t steps that also need roughly t/log(t) bits of memory.

(The Quanta magazine article https://www.quantamagazine.org/for-algorithms-a-little-memor... gives some context: for a long time, the best result was t/log(t) as proved in "On Time Versus Space" https://dl.acm.org/doi/10.1145/322003.322015 by Hopcroft, Paul and Valiant in 1975.)

makira · 8 months ago
makira commented on I Reversed a Drone and Landed It with My PC   hardbreak.wiki/network-an... · Posted by u/hw-f3nter
magnat · a year ago
Lots of no-name or DIY drones use flight controller running a BetaFlight [1] firmware, which is open source and quite hackable. If you want low-level real-time programmatic control (like manipulating servos, lights or camera), that is most likely the easiest way. There is also ArduPilot [2] firmware, which is focused more on the high-level control (like managing GPS waypoints and autonomous takeoff/landing).

In both cases you can piggyback your control signals using standard radio or use serial port via dedicated wireless bridge.

[1] https://github.com/betaflight/betaflight

[2] https://ardupilot.org/

makira · a year ago
Any reason BetaFlight doesn't appear to have even basic pre-shared key symmetric encryption? Some ciphers aren't that CPU intensive.
makira commented on The politically incorrect guide to saving NASA's floundering Artemis Program   arstechnica.com/space/202... · Posted by u/dotnet00
makira · a year ago
I wonder what will happen to Canadarm 3, as work for it has already started.

https://www.asc-csa.gc.ca/eng/canadarm3/about.asp

makira commented on A beginner's guide to constant-time cryptography (2017)   chosenplaintext.ca/articl... · Posted by u/histories
mratsim · 2 years ago
I've written and given a lot of references to attacks, countermeasures, fighting the compilers and even non-cryptographic side-channel attacks to uncover someone's Twitter identity:

- https://github.com/mratsim/constantine/wiki/Constant-time-ar...

makira · 2 years ago
Do any of these attacks matter for single-tenant computers where all network packets are sent on a hardware timer (say, 10 kHz) independent of crypto computing? Doesn't that mitigate any side-channel timing attacks from the start?

u/makira

KarmaCake day366March 24, 2011View Original