Comment Re:What does "stealing" bitcoins mean anyway? (Score 1) 227
Thanks for the excellent explanation.
Thanks for the excellent explanation.
My understanding of bitcoin is limited, but I thought that there were distributed public ledgers that track transactions on the bitcoin network. How would they transfer these without anyone knowing?
That's nice. I'll have to pay more attention on my next camera. Think my Nikon D60 only goes up to 1200. How is the graininess on that camera? Mine gets really grainy on long exposures if I have ISO above 800. I know that's kind of the holy grail pipe dream of getting high ISO without graininess.
Not to mention having to keep a notebook on settings you used for each photo so that you could learn what is working.
One thing is for certain, there's alot of things that are alot easier and cheaper to do in digital. I did alot of long exposures and night photography. Trying to get a balance between grainyness and being too dark is challenging when the feedback you get on your settings is a couple weeks later. You can go through a whole roll trying different settings. One time I went to pick up prints and the lab gave me the negatives and said they didn't turn out. I had to point out to them a couple shots on the negatives that were of a little bio-luminescent grub. They were skeptical but went and printed them for me and they turned out fine. That was an entire roll of film just for two pictures.
I also got alot better because I was getting immediate feedback when using manual settings.
It also makes doing timelapse photography feasible on an amateur budget.
What's really odd to me is the digital cameras are not any better at capturing light. I saw a documentary on a large telescope that talked about how much light is not captured by film, and what a huge amount more is captured by a CCD, which is important for imaging faint objects. Maybe they have a better CCD than what you get in cameras.
LOL You don't hear the grapevine! You hear IT THROUGH the grapevine. I.e. if there were a grapevine wall and people talking on the otherside that didn't know you were there. The grapevine itself doesn't talk, it's a freaking plant!
That would be funny. A lab technician standing next to you instead of a microscope(scanning electron... whatever they use) and asking you what you see and you trying to describe it to them in words, or drawing a little picture, lol. Not trying to be mean, just a funny image to me.
He said "I" and "Everyone I Know". Those are some pretty specific constraints. He was making a speculation, and I see nowhere that he extrapolate that to everyone. Nor did he indicate he was an American, nor in Southern state if you're the same AC commenting below. Seems you're just as bad as far as making hostile presumptions about other people based on little to no evidence. You're entitled to your opinion, but should be embarrassed at your hypocrisy because it just demonstrates your own stupidity.
Don't sue the bus driver because you stepped in from of the bus.
You don't need to sue them, you can simply not do business with them and they will have no data to collect. No one forced you to do business with these corporations. The ability for them to sell your data is made clear in the user agreements. Whether or not you read them, it's pretty much common knowledge.
" 7 dog years = 1 human year. How many years would it be for a digital dog @ 4.4GHZ?"
The same amount of time as it would be for a digital human. Changing the units of measurement does not turn years into seconds, it's still the same length of time. You are so blatantly stupid, yet think you are qualified to tell people they are wrong regarding things you obviously possess only a pseudoscience knowledge of... is the only thing that is mind blowing.
Exactly, jailbreaking a phone is a completely different animal, because within the device somewhere is the private key, and it is only hidden through obfuscation. Just like a desktop, you have access to the complete system, and it's just a matter of time, skill, and effort to pulling it a part and either finding the private key or bypassing.
On the other hand, a proper keyless system has the private key in the FOB, and assuming all the components of the system are properly implemented using well established security standards, then there should be no FEASIBLE way to defeat the cryptography in a short amount of time without physically stealing/breaking open a FOB or physically modifying the vehicle.
In the phone case, the manufacturer wants to prevent you from breaking into the phone, but they handed you the private key inside the phone. In the case of the vehicle, only you the owner carry the private key in your FOB, and the criminals do not have that. Unfortunately there's probably alot of vehicles with vulnerabilities or not even an architecture that could laughably be called security.
I would be surprised if the majority of keyless entry was RFID. It may be that the vulnerable ones use this, but RFID is not in anyway a form of authorization. It is a form of identification. The difference is your username and your password. Anyone should be able to get the RFID and be no closer to accessing the system, just as your username is not private information and is fairly useless without the password. Their are lots of easy and inconspicuous ways to steal an RFID because it's just their saying "HEY, I'm 157951234654..." and anything can read that ID and then easily masquerade as that RFID.
A proper keyless system uses cryptography(and does so properly). This is why many FOBS are quite expensive to replace and have a battery inside. When you attempt to unlock the vehicle, the vehicle sends a challenge to the FOB, and the FOB uses a private key to sign it, the vehicle then gets that signed response and verifies it using the public key. I know that my FOB uses a 40bit key, which isn't very strong. Hopefully the vehicle has delays in place to prevent someone from trying thousands of keys a second, otherwise it could be broken with brute force given the small key size. This would still take a good while though.
It's possible that some of these vehicles are vulnerable if someone got their hands on a database of public keys(or worse private keys), from which you could spend time searching for the private keys through brute force and build up a database of the private keys, and then load that list onto a portable device the masquerades as a FOB.
There's lots of possibilities.
It could be viewed as a set of values with a mapping to another set with a binary representation.
Work without a vision is slavery, Vision without work is a pipe dream, But vision with work is the hope of the world.