Hacker Newsnew | past | comments | ask | show | jobs | submit | more ComodoHacker's commentslogin

Secrets are either written down somewhere and end up on the Internet, or forgotten.


It doesn't have to be the unspeakable, but rather can be the name of the first pet or something others just can't guess on the first time.


The problem here is you're assuming your family members aren't idiots, this is your first mistake.

Chances are they've already shoved some app on their phone that's voice to txting everything they say and sending off somewhere (well lower chance if they have an iphone).

Modern life is data/information security and humans are insanely bad at it.


By chance, they are noobs but not idiots, because they ask me on everything - they don't need Google, I know everything hahah

I don't think it's a problem to find a word or a sentence or a story - whatever - that's commonly used by everyone on daily basis but in different context. That's not a problem by itself :) try it

For the idiots, it is still possible to find a word. They may be idiots, but still, they work and live on their own. They coming along in life. So, it's up to the smarter one to find a no-brainer solution.

I am confident and believe nothing and no one is stupid enough not to be able to adapt to something. Even if it's me, who'll need to adapt to members with less brain.


Could random packet delays or delay equalization help here (instead of additional packets)?


Yes, for sure. As a defender, you have two main tools: dummy packets (bandwidth) and delaying packets (latency). Padding-only defenses will indirectly delay normal (non-padding) packets by filling the connection with padding. You want to explicitly block outgoing traffic and try to account for congestion to minimize wasted bandwidth.

This is tricky. We have hardly started dealing with traffic analysis issues in protocols. In general, we have spent the last decade+ getting encryption sort of right with amazing efforts like TLS 1.3 and WireGuard, etc. Expect another decade for traffic analysis.


My father have used PVA for homemade wine for decades. Works fine.


Is there any technical docs on internals? How it does I/O, caching, consistency, concurrency etc.?


that's probably not what this is aimed at. especially as most people have SSDs and loads[1] of ram

[1] compared to the days of filemaker


This doesn't seem to consider or give insight on any tradeoffs involved.

Also, the underlying extension, HypoPG, doesn't seem to collect any statistics on data to influence query planner.


Big Guys do this. For big bucks, of course.


> big bucks

You get that feature in Azure SQL Database for $5/month.


>this basically comes down to State Actors ... or Everyone Else

This is oversimplification if not misleading. There are also Bad Guys (who aren't state actors), who usually can't reach for your data. But occasionally they can, when rare Planet Parades like Heartbleed or Meltdown make the news. And they are happy to use this one-in-a-lifetime chance to sell access to your data to everyone else.


I guess I don't understand how something like Heartbleed can hit you if you don't click on boner-pill ads, Fastmail's servers don't get hit, and you're not installing random apps from random internet folks?


>the sensible default would be to send email unencrypted

That's exactly what anti-encryptionists would want.


Or realists that think that encryption-by-default needs to be designed very differently from PGP, and that forcing people into something brittle will not win any sympathy.


That's the same sort of argument form as "everything encrypted is what the terrorists and child pornographers would want". Just sayin'.


So, the next candidate for backdooring? :)


Bah, don't give them ideas! Honestly, codecs are a worrying target for supply chain attacks because they're complex and use a lot of memory-unsafe code. Just look at all the image format attacks throughout history (a memorable recent one being the libwebp vulnerability.)


And if you play on PC, also avoid Tales of Maj'Eyal (https://te4.org/), because of its depth and almost infinite replayability.


The crazy imaginative class selection in ToME (special shoutout to the chronomancer) easily makes it my go-to roguelike, but I do find I have trouble really feeling what the impact of my build choices are, although this is a common feeling with roguelikes - I probably feel it more in ToME because it feels like every level-up has a much broader decision space than most other roguelikes. Also that most enemies (at least early game) aren't a major challenge until you hit one that wrecks you.

Most of the time I go with "rule of cool", blaze ahead, and die somewhere around the time I get to the sandworm tunnels.

The farthest I ever got was what felt like the first real boss who just teleports you to <FUN> which came out of left field and my character in that run was _not_ prepared to handle that.


I'm still trying to beat it on normal difficulty. The farthest I got was first floors of the necromancer's tower, which is about 1/4 of the game AFAIK. I resist the temptation to try any add-on, there's so much fun without them.


That is why I am a fan of games that buff your character over repeated runs.

If more games did this, the difficulty slider could go away. As an added bonus, there is a satisfaction of getting to the point where you are so overpowered the game essentially breaks (see: vampire survivors)


the "open source" part https://git.net-core.org/groups/tome (GPLv3)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: