Forgot your password?
typodupeerror

Comment Re:Vibe coding was never for production code (Score 4, Insightful) 27

Problem for everyone is that mindset does not save cost/produce value.

Even when part of the AI companies try to show utility honestly, they get drowned out by their own executives bulldozing the nuance aside and pretending it is just a magical replacement for software developers.

Comment Re:snatched waste (Score 2) 89

Hey, can you imagine how much better the plumbing in your house would be if the pipes were a bunch of 1 inch sections connected by joints?

I don't know why you'd think the short sections would have to be aligned less precisely. A 1 mm error multiplied by a a couple thousand joints between 10 m sections has a good chance of being a lot bigger than a 1 mm error multiplied by 80 joints.

I used to think that maybe I, a simple country ignoramus, just wasn't equipped to understand the Wonders of the Modern Age.

Nonsense. The key is to keep that humility and read a book or use the informative parts of the Internet.

Comment Re:lol (Score 1) 89

It's already been spent... on you.

The people of the United States, represented by their duly elected representatives, illegally collected this money, and then spent it. Mostly on the military, to judge by the latest funding requests. So yeah, the perpetrators of the crime have to pay the restitution. It doesn't matter that you hired someone else to do the crime on your behalf.

Comment Re:Itâ(TM)s should be refunded without needin (Score 1) 89

That's ridiculous. Tariffs come with records (copious amounts) on both sides. The government knows exactly who paid them, and those people have a nice receipt from the relevant authority.

There might be some squabbling over exactly which payments fall under the specific tariff regimes that were ruled illegal, and getting your current government to actually follow the law is dicey, but there's nothing that needs to be investigated.

Comment Use Argon2id (Score 1) 99

Using a proper password hashing algorithm mostly addresses this concern... and standard cryptographic hashes like MD-5, SHA-1, SHA-256, etc. are not appropriate. They're designed to be as time and space-efficient as possible while still achieving their security goals. Password hashing functions (more precisely, password-based key derivation functions) are designed specifically to be time and space-hungry, efficient enough that you can execute them in half-second or so for user authentication, but slow enough that brute forcing even moderately-good passwords is intractible.

The best widely-available algorithm is Argon2id. The modern algorithms don't focus so much on requiring lots of CPU cycles because GPUs. Instead, they focus on requiring significant amounts of RAM, in ways that provably cannot be reduced. The most-recommended Argon2id configuration requires 2GB RAM. This makes it feasible for most servers to handle fairly easily, as long as they don't have to verify too many passwords in parallel, but it means that GPUs don't help the attacker, and it's also slow enough that while you can get some traction by using a large botnet, it's really not very much. If a PC requires 500ms per attempt, and you have a million-machine botnet, you can still only try 2M passwords per second. If user passwords have, say, 30 bits of entropy, your massive botnet can find one every five minutes on average. If they have 40 bits, your botnet can find a password every ~3 days, on average. That's not nothing, but if you have control of a million machines, you can definitely find better uses for them.

Of course, even better is to use passkeys or similar, but as a practical matter you probably have to have a password to fall back on.

Slashdot Top Deals

Reality must take precedence over public relations, for Mother Nature cannot be fooled. -- R.P. Feynman

Working...