Comment Re: Hell hath frozen over! (Score 1) 97
Oh, and a "train" is a bit like 100 cars back to back.
Oh, and a "train" is a bit like 100 cars back to back.
Using a proper password hashing algorithm mostly addresses this concern... and standard cryptographic hashes like MD-5, SHA-1, SHA-256, etc. are not appropriate. They're designed to be as time and space-efficient as possible while still achieving their security goals. Password hashing functions (more precisely, password-based key derivation functions) are designed specifically to be time and space-hungry, efficient enough that you can execute them in half-second or so for user authentication, but slow enough that brute forcing even moderately-good passwords is intractible.
The best widely-available algorithm is Argon2id. The modern algorithms don't focus so much on requiring lots of CPU cycles because GPUs. Instead, they focus on requiring significant amounts of RAM, in ways that provably cannot be reduced. The most-recommended Argon2id configuration requires 2GB RAM. This makes it feasible for most servers to handle fairly easily, as long as they don't have to verify too many passwords in parallel, but it means that GPUs don't help the attacker, and it's also slow enough that while you can get some traction by using a large botnet, it's really not very much. If a PC requires 500ms per attempt, and you have a million-machine botnet, you can still only try 2M passwords per second. If user passwords have, say, 30 bits of entropy, your massive botnet can find one every five minutes on average. If they have 40 bits, your botnet can find a password every ~3 days, on average. That's not nothing, but if you have control of a million machines, you can definitely find better uses for them.
Of course, even better is to use passkeys or similar, but as a practical matter you probably have to have a password to fall back on.
Anyone expecting corporations to not try to make a profit and extract maximum value for their shareholders ignore that that's their fiduciary duty.
"this belief is utterly false. To quote the U.S. Supreme Court opinion in the recent Hobby Lobby case: 'Modern corporate law does not require for-profit corporations to pursue profit at the expense of everything else, and many do not.'"
https://www.nytimes.com/roomfo...
"We
So glad I switched from Fitbit to Garmin. Google has done everything possible to lose me as a customer.
Not necessarily true. Pattern day traders are forced to mark to market.
Cite? I'm not a CPA but AFAIK, being a PDT has no direct tax implications, it just invokes brokerage/margin rules.
As I understand it (and I skimmed the law), 475(f) elections are entirely optional. The tricky thing is that you have to make the decision of whether you're going to elect to mark to market by April 15 (e.g. you have to decide by April 15, 2026 if you'll mark to market on December 31, 2026), and you generally cannot change that decision. So if you think it's going to be a bad year, it's a good idea to elect, because it removes the cap on loss deductions. If you expect to make a lot of wash sales and don't want to bother tracking them, that's another reason to elect.
But as far as I can tell, it's purely voluntary. Can you point to evidence to the contrary? Ideally in the law, but a reputable investor information site would be fine. I checked several (e.g. https://www.optionstaxguy.com/...) and they all describe it as a choice. One that is binding once made, but still a choice.
You don't know if it's always on. Those details aren't present (that I saw), and it's likely that they would throttle when the grid was under heavy load. A reasonable inference from what the company (who make "smart" electric panels) is saying about power management.
As for cooling, "Span is incorporating technology from Nvidia into its system, including a liquid-cooled, fanless component inside the server. The design helps eliminate the noise typically associated with data centers—a frequent complaint in communities near large facilities."
It's also possible to pair it with a large residential roof solar installation. I installed solar recently (just in time to grab the 30% credit) and my system routinely generates 3X what my home uses in the course of a day (I typically use about 40 kWh per day, and often generate 130+kWh per day). I've been thinking I'd really like to find something to suck up that extra power, because the monthly net billing plan I have means that once I've zeroed out my bill for the month, I get no benefit from additional production.
As deployment of renewables continue, this "problem" of what do do with excess capacity will increase and spread.
However, if power for the mini-datacenter is only intermittently available, the cost of the hardware effectively increases on a per-token (or per FLOP or however you want to measure the system's work) basis... and hardware cost is already going to be a tough problem for this kind of deployment. Even if it could count on 100% utilization, it will struggle to compete with large datacenters for exactly the reason we build large datacenters: Economies of scale. Enclosures (buildings), cooling, maintenance... all of the overheads fall with scale.
Intermittent utilization just makes that problem worse.
On balance, I'm skeptical that this makes sense, unless the cost of the hardware falls significantly. It seems like that's a baseline requirement for a lot of the alternative datacenter ideas, though: orbital datacenters, floating datacenters, etc.
I was thinking Bartz vs. Anthropic, but there are other rulings.
I think someone summarized them further down, but I recommend reading them for yourself.
Bartz v Anthropic is not a binding precedent. It could have been binding in the 9th circuit, but they settled before the appellate court could consider it. And, of course, it's always possible that the appellate could have reversed Alsup.
I think this question is still very much in undecided. It's trending against Meta's interests, but AFAIK isn't there yet.
> If an attacker has enough control of your machine...
Not a plot-twist. Microsoft is the attacker or aiding and abetting someone that is. You are evaluating the world as if rules of conduct still exist anywhere among the ruling class.
Put the tinfoil hat down and step away...
I'd love to trash Edge, but it's hard to argue against Microsoft's analysis here
i think you don't get the irony. this is the company that campaigned furiously for the necessity of tpm for consumer devices
There's really no irony here. TPMs serve a different purpose, that of ensuring that the software you're running isn't maliciously modified.
decrypting an entire password list and leaving it around in memory for no reason is totally unacceptable practice
It's really no different from keeping the password database encryption key in RAM, or the capability which grants access to the database encryption key (however many layers of that you want to go down) which is what you have to do if you want to be able to use the passwords on-demand without an authentication step.
It shows that for Microsoft, security is an afterthought rather than a priority, with the obvious result that Microsoft software is not secure. RAM plaintext passwords mean that any programmer mistake could expose them to the world. If they don't exist in RAM (Chrome's way), they're impossible to expose.
If Chrome has access to them without user authentication, then so does any attacker who can dump Chrome's RAM.
If you have a process that provides a service that hands out passwords, it's irrelevant whether the passwords are plaintext or ciphertext. An attacker who compromises a rendering process can only query -- but can probably query a lot. An attacker to breaches the process separation, well...
Note that this is separate from whether the on-disk database needs to be encrypted. There are additional threat vectors there.
It'd be a lot harder to find a (probably hashed) master password sitting in RAM, since it would look just like random bytes, than plaintext passwords. And you could surround the hashed master password with lots of other random bytes to make it even harder to find.
Nah. You just try all the bytes. It's not that many.
hey can dump your password database,
The password database is encrypted. At least it should be.
If the browser can decrypt it without you entering a password or doing a biometric authentication to a secure enclave, then so can an attacker who controls the browser. Encrypting the database achieves something useful against an attacker who can read the browser's files, but not against an attacker who can dump the browser's RAM.
The ideal voice for radio may be defined as showing no substance, no sex, no owner, and a message of importance for every housewife. -- Harry V. Wade