• 1 Post
  • 26 Comments
Joined 1 year ago
cake
Cake day: July 3rd, 2023

help-circle

  • There’s a lot of misinformation in this thread. Sure, they broke 22-bit RSA encryption. But here’s the thing - that’s proof that a suitably large quantum computer can break any size RSA encryption in the same amount of time it took to break 22-bit RSA encryption.

    Because of the way the annealing process works, it’s a known-time process, no matter how many inputs or q-bits are used. We don’t have the ability to create a computer with sufficient q-bits to break anything more than 22-bit at the moment, but current estimates are that in 10 - 15 years we will have enough to break 1024-bit.

    And it’ll take the same amount of time as this 22-bit process took.

    And that basically means we need new encryption processes within 10-15 years, that are quantum safe, or all our encryption is belong to whoever has these quantum computers.


  • In one sentence, you say, “just use a password manager”, on the next, “not really an improvement if you need extra software”. I’m not sure what argument you’re having, but neither one really addresses what this article is about.

    This keeps the passkeys in the password manager (I use dashlane, it rocks, and synchronises the passkeys just like the passwords), but this new protocol allows you to change and export the passkeys to other password managers, preventing vendor lock in and allowing for transfer to another password manager.

    Hope this clarifies things! And everyone should use a password manager of some kind; we should expect whatever site we’re using to be hacked, and the only way to be safe is to have a unique password per site.







  • That’s because the drive was written to its limits; the defrag runs a TRIM command that safely releases and resets empty sectors. Random reads and sequential reads /on clean drives that are regularly TRIMmed/ are within random variance of each other.

    Source: ran large scale data collection for a data centre when SSDs were relatively new to the company so focused a lot on it, plus lots of data from various sectors since.




  • The old Chernobyl virus did this. I caught it. Had to restore the MPT of a FAT32 drive - fortunately, the MPT and first FAT fell outside the boundary of the destruction, so I was able to use the 2nd FAT to restore the files and get pretty much everything back. Was stressful - lots of running to the second computer to get details of how the hex structure of the MPT was built and recreate it because using a tool would have formatted/erased what was there (This was early 00’s, off an old magazine cover floppy disk). Fun times, and not something you want to do with a business machine or with critical software (Though, why haven’t you got it backed up in an air-gapped way if it’s that critical?)


  • I do it regularly… I particularly like 4.

    In all seriousness, I use it when I need to time something - 32 on one hand means one minute (approximately) with two rotations. I started when trying to determine if my daughter was asleep, waiting for a minute after she’d last moved or talked, and I didn’t want a screen or light or noise to wake her (she’s always been hard to get to sleep).

    So - yeah it’s a tiny bit tricky to do some combos, but no more than touch typing.