|
As an ActiveX control in IE.
|
|
|
|
|
For your byline:
"And with strange aeons even death may die."
About 2,022 years ago, death was defeated.
|
|
|
|
|
An encryption algorithm that was supposed to stand up to attacks from the future's most powerful computers was recently laid low by a much simpler machine. Maybe it's just good against quantum computers?
|
|
|
|
|
"Just avoid holding it in that way" Former Apple CEO Steve Jobs
Caveat Emptor.
"Progress doesn't come from early risers – progress is made by lazy men looking for easier ways to do things." Lazarus Long
|
|
|
|
|
I told you guys before that a one time pad is unbreakable. Maybe the supposedly encryption algorithm developers did not read this site or other sites that people told them that.
Specifically, according to a a report on Single-Core CPU Cracked Post-Quantum Encryption Candidate Algorithm in Just an Hour[^] the algorithm used two curves and a map between them. That can be found via calculus which existed before electronic computers. When I went to college, long ago, some engineers and other fields were required to learn all 4 semesters of calculus. If an engineer saw the logic path of the algorithm, they might have cracked it in less than 5 minutes without a computer. Man made and man devisied Algorithms can be broken.
According to Wouter Castryck, KU Leuven, and Thomas Decru, KU Leuven, "Our attack exploits the existence of a small non-scalar endomorphism on the starting curve" and this was on an old single core "in about one hour".
Back to the Quantum computer stuff: It does not exist as a different system from binary analytics. Both use transistors, or if they can print them small enough Insulated Gate Bipolar Transistors, which are both just transistors. Nothing new. An IGBT just has an insulator that resists cross-talk or current leakage between the switch and the switched. A quantum computer is being advertised as using more binary to construct basic binary, therefore it is based upon transistor binary operations at its basic level. Think of an 8 bit byte thereupon requiring 8,000 [whatever they want to call them] binary switches just to get back to that byte.
I expeced this to happen.
Thank you.
|
|
|
|
|
Member 15078716 wrote: When I went to college, long ago, some engineers and other fields were required to learn all 4 semesters of calculus. If an engineer saw the logic path of the algorithm, they might have cracked it in less than 5 minutes without a computer. Man made and man devisied Algorithms can be broken.
If you listen to the CP hive mind, for a programmer a degree is useless, college is useless, math is useless. There is only Javascript.
GCS/GE d--(d) s-/+ a C+++ U+++ P-- L+@ E-- W+++ N+ o+ K- w+++ O? M-- V? PS+ PE Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
it math is used to encrypt, and math used to decrypt, then math would say math can be used to hack/decrypt/crack said encryption.
and somepeople write complex math, newtonion physics, then someone comes along and says, you can simply that to e=mc2
|
|
|
|
|
I think that of all the math formulas that I have been given in this life, that one (e=mc^2) took me the longest to understand. I found quantum physics to be very interesting, but difficult to fully understand. I think that I might have read 3 or 4 books on Einstein and his own explainations of that before I became comfortable with quantum logic (the "real" quantum logic). Those "quantum" computers which are being tested by the National Bureau of Standards are not quantum mechanic based. They are fake quantum. They are a scam. The NBS has proven the current concept of quantum machines as advertised to be applied to currently built computers to be a scam.
Back to the encrypting: If a code generated by machine could not be cracked, other than a true One Time Pad (which is by definition NON-REUSABLE), then the NBS would have found it already.
|
|
|
|
|
Thousands of GitHub repositories were forked (copied) with their clones altered to include malware, a software engineer discovered today. Fork!
|
|
|
|
|
I doubt that. It looks like click bait to get more pass through clicks at GitHub.
|
|
|
|
|
I guess if you are doing open source, github is okay, but letting MS manage anything from a security point of view in the cloud is a recipe for disaster.
My source code is behind a firewall on an internal network. Period.
Charlie Gilley
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
Has never been more appropriate.
|
|
|
|
|
|
I don't like either of both, but I think it is time Musk gets accountable for some of his actions...
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Yes, this is one of those cases where it's a shame that both sides can't lose...
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Daniel Pfeffer wrote: it's a shame that both sides can't lose...
FTFY ==>> Legal fees!!
but, you're still probably right since they are both a bottomless pit of money.
|
|
|
|
|
Well... I mean... both in one target...
|
|
|
|
|
i hope he buys twitter and shuts it down asap
Caveat Emptor.
"Progress doesn't come from early risers – progress is made by lazy men looking for easier ways to do things." Lazarus Long
|
|
|
|
|
IBM board of directors investigates sales fraud claims • The Register
IBM's board of directors has started an investigation into claims that its sales numbers were manipulated, leading to executives securing big bonuses. If the board fails to take any action, it may face a lawsuit to claw back millions of dollars from top staff.................
Caveat Emptor.
"Progress doesn't come from early risers – progress is made by lazy men looking for easier ways to do things." Lazarus Long
|
|
|
|
|
I thought it might be booking sales in the year the contract was signed instead of when payment was received. But no, it's shifting revenue from the mainframe business to the CAMSS (Cloud, Analytics, Mobile, Security, and Systems) businesses, which IBM touts as "strategic". That'll be harder to prove, because how to apportion revenue when several business units are involved is debatable. But when bonuses are based on such things, games will be played.
|
|
|
|
|
With new technological advancements coming onto the market everyday, managers of development teams need to be adaptable in their management style as well as persistent in overcoming roadblocks. Same as always - managing developers
|
|
|
|
|
As a manager of developers I'd say it's managing the CEO.
|
|
|
|
|
Protecting developers by managing up and out instead of down is the hallmark of the best managers. It sounds like yours are fortunate.
|
|
|
|
|
A behavioral economics study of anti-piracy ads reveals that they’re largely ineffective and often encourage piracy. "It's more fun to be a pirate than to join the navy."
|
|
|
|
|
Or you can do both.
Obligatory Muppet video: In the Navy
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
That article doesn't say it, but it implies, correctly in my opinion, that the entertainment industry is completely out of step with the rest of the world.
|
|
|
|