Forgot your password?
typodupeerror

Comment Re:We have all seen Mozilla (Score 2) 84

Since they cannot simply put that much money onto a bank-account, they reasonably did all kinds of non-browser related things with it.

They could have created an endowment and then would not have had to worry when the money dried up, because the earnings on the principal would have funded them through the end of time. But, like most non-profits that end up with a bunch of money, they just used the opportunity for mission creep.

Comment Re: One thing that would be interesting (Score 2) 40

I see that AI can find bugs that are tedious to find and only exists in corner cases that normal humans usually don't test. For every successful positive test case there can be a large number of negative cases with subvariants. That's where AI might be helpful - create all those test runs.
But to write code that's maintainable, with high performance and stable - that's a different thing.

Test code that doesn't work - just generate a new batch, it won't damage the product you deliver but it might have some flaws.

Hackers often utilizes corner cases when they breach into systems.

Comment Re:The Horse is Already Gone (Score 1) 65

QCs are completely unsuitable for reversing hashes and that is what cracking passwords needs.

Translation: we don't currently have a quantum algorithm for reversing hashes. But there was a time, not that long ago, when we didn't have a quantum algo for factorization either. However, I don't expect to see a quantum algo for hash reversion any time soon, because the whole problem of reversing hashes is pretty complex.

Factorization as a classical problem is essentially trivial, in that there are very simple classical algorithms for it. They just take a lot of time to run. But coming up with an efficient quantum algorithm was not trivial, and the algorithm itself isn't so simple. So you can estimate that a quantum version of any algorithm is a lot more complex than the classical counterpart.

Comment Re: Mac OS has already started to pester me (Score 1) 65

"quantum resistant forever" is too strong.

I've only taken fairly general master's level courses in quantum information and regular cryptography, but I agree with this overall sentiment. My math professors used to say that no asymmetric encryption scheme has been proved unbreakable; we only know if they haven't been broken so far. Assuming something is unbreakable is like saying Fermat's last theorem is unprovable — until one day it's proved. So to me "post quantum cryptography" is essentially a buzzword.

Comment Re:How is the lack of govt information relevant? (Score 1) 82

That's why I said "I suspect" meaning it *might* be. I just shared what I have observed.

The type of attacks I am talking about are similar to this one:
https://en.wikipedia.org/wiki/...

The attackers exploited software or credentials from at least three U.S. firms: Microsoft, SolarWinds, and VMware

You posted a link referencing a spear-phishing attack which has very little to do with where the email account was hosted and the entity providing the email service.

Comment Re:How is the lack of govt information relevant? (Score 3, Insightful) 82

All people I know who got their email hacked were on outlook. None on gmail nor any other provider. I am really curious about if he was on outlook or not. I suspect some hacked outlook email accounts have nothing to do with the user being negligent and has to do with microsoft cloud being full of security holes.

I keep on blocking full /16 microsoft cloud networks from accessing my services while I only block single IPs from amazon and google cloud and get orders of magnitude less bad request from them then Microsoft. This leads me to suspect some vm instances running on microsoft cloud were hacked directly because of security holes in microsoft cloud itself, not because the owners of the vm instances were negligent.

Comment Dumped Grok over this (Score -1) 72

Grok was constantly say it was doing something that it had ZERO ability to, and I kept calling it out and it kept apologizing and then immediately doing it again.

As a guy who spend 5 figures a year on Ai, the last thing I want is that. I know Claude and ChatGPT also do it, but Grok was doing it CONSTANTLY.

Comment Re:too bad (Score 1) 312

A well regulated militia would be one that was well trained and equipped

Excuse you? The entire reason for the Second Amendment was that the government could NOT equip enough militia. Your premise is extremely flawed.

Excuse you? The right to keep and bear arms ensures that the government does not have to equip the militia, the citizenry owns their own equipment. Many states required law that the citizenry own said equipment, the specifics of what the militiaman should be equipped with being enumerated in law.

The (federal) Militia Act of 1792 states "That every citizen, so enrolled and notified, shall, within six months thereafter, provide himself with a good musket or firelock, a sufficient bayonet and belt, two spare flints, and a knapsack, a pouch, with a box therein, to contain not less than twenty four cartridges, suited to the bore of his musket or firelock, each cartridge to contain a proper quantity of powder and ball; or with a good rifle, knapsack, shot-pouch, and powder-horn, twenty balls suited to the bore of his rifle, and a quarter of a pound of powder; and shall appear so armed, accoutred and provided, when called out to exercise or into service, except, that when called out on company days to exercise only, he may appear without a knapsack."

But, sure, my premise is extremely flawed.

Slashdot Top Deals

Never worry about theory as long as the machinery does what it's supposed to do. -- R. A. Heinlein

Working...