Forgot your password?
typodupeerror

Comment Re:The cart before the horse (Score 1) 31

They have working software: OCX is intended to replace the current ground system, Operational Control System (OCS). They have launched a lot more than 30 satellites -- in fact, most of them have been decommissioned, although the currently operational set have mostly outlived their design lifetimes by a lot. The oldest active satellites are Block IIR satellites, with a design life of 7.5 years ... and launched between 1997 and 2004 (so the youngest of them would be old enough to drink alcohol in the US).

https://en.wikipedia.org/wiki/...

Comment Re: Mac OS has already started to pester me (Score 1) 65

Sure, it is not a big problem for SSH. It is a problem when you connect to a web site, especially as certificate lifetimes get shorter: you need the whole certificate chain from a root (that your browser trusts) to the web server, which means at least two public keys and signatures and often more.

The NIST-approved post-quantum options and PK/sig sizes (in bytes, for "security level 1", which is the lowest) are Crystals Dilithium 2 (1312 / 2420), Falcon-512 (897 / 666 but computationally expensive) or SPHINCS+-SHA2-128s (32 / 7856 for the smaller but more computationally expensive signatures; same for SPHINCS+-SHAKE-128s). This compares to 32/64 or 64/48 bytes for 256-bit ECC algorithms and 256/256 bytes for 2048-bit RSA. If you are fetching a few kilobytes of text or CSS, this additional overhead is huge.

Comment Re:Mac OS has already started to pester me (Score 1) 65

Yup. I'm waiting for any quantum computer to actually break a non-trivial public key, even of a laughably small order (like RSA130, which was factored by classical computers 30 years ago). Lots of people get famous for papers based on theoretical quantum gates that nobody knows how to realize.

Comment Re:Mac OS has already started to pester me (Score 3, Insightful) 65

Elliptic curve crypto is vulnerable to the same kind of theoretical quantum attacks as integer-factorization cryptography. You currently need to use algorithms with unfortunate trade-off (large public keys or large signatures/key agreements) to get resistance to quantum attacks.

Assuming quantum computers ever factor numbers larger than 21 without cheating or falling back to deterministic algorithms, at least.

Comment Re:Point of information (Score 1) 108

He's also a fool when it comes to politics. People should want government writing rules and picking winners for AI just as much as for social and news media: not picking winners at all, and setting as few and as narrow rules as possible. Do you want the default (or only) AI service to run like the DMV?

Betteridge's Law continues to hold true.

Slashdot Top Deals

Your mode of life will be changed to EBCDIC.

Working...