knightly

joined 1 year ago
[–] [email protected] 1 points 1 hour ago

Don't bother.

Instead, start preparing for the inevitable:

[–] [email protected] 4 points 3 hours ago (1 children)

You're so close~

Voting is a placebo, but every election is stolen before it's even held. Party members decide who gets to run in the primaries and draw the congressional districts to ensure no third parties could ever hope to win. Actual competition between the parties is limited to battleground states, electors elsewhere have no influence on the outcome.

So, you're right, but not in the way you think. The political establishment pushes an illusion of choice to keep the population from exercising its power.

[–] [email protected] 2 points 6 days ago

I have to go back over and stitch in the edges on all my iron-on patches, might have to look into that if they'll do a better job.

[–] [email protected] 1 points 3 weeks ago (1 children)

In the tech industry, when a system doesn't work and can't be fixed we throw it out and start over.

[–] [email protected] 0 points 1 month ago

I plan to, which pisses off Doctor Evil's Democrats.

[–] [email protected] 7 points 1 month ago

Good, get it all offline so the LLM Assholes can't use it.

[–] [email protected] 16 points 1 month ago (4 children)

Lol, worst autocorrect ever. XD

[–] [email protected] 3 points 1 month ago

Dunno! I haven't been to Twitter since Elon bought it and activated our scorched-earth protocols. Twitter hasn't been accessible on any device in our network since then.

[–] [email protected] 55 points 1 month ago (5 children)

Queer folks have a bad habit of falling in love with people on the other side of the country.

[–] [email protected] 0 points 2 months ago (2 children)

Crypto is just as insecure as credit cards. The whole point of the blockchain is that everyone can see all transactions.

[–] [email protected] 57 points 2 months ago (9 children)

I work in this industry and I can confirm that there's fucking nothing ensuring the privacy of these transactions. Tens of thousands of people have full access to everyone's credit card history, and that's not counting unauthorized access and card skimmers.

[–] [email protected] 0 points 3 months ago* (last edited 3 months ago) (1 children)

A "side-channel attack" is one where fundamental flaws in the encryption implementation method are targeted, as opposed to flaws in the cryptographic algorithm itself.

By means of analogy, if your cryptographic method is to go to a locked room to have a private conversation, then a spy doesn't have to pick the lock if they can still hear you through the door. The locked-room security method itself isn't flawed, but implementing it without a soundproof door has much the same result.

In this case:

The threat resides in the chips’ data memory-dependent prefetcher, a hardware optimization that predicts the memory addresses of data that running code is likely to access in the near future. By loading the contents into the CPU cache before it’s actually needed, the DMP, as the feature is abbreviated, reduces latency between the main memory and the CPU, a common bottleneck in modern computing. DMPs are a relatively new phenomenon found only in M-series chips and Intel's 13th-generation Raptor Lake microarchitecture, although older forms of prefetchers have been common for years.

Security experts have long known that classical prefetchers open a side channel that malicious processes can probe to obtain secret key material from cryptographic operations. This vulnerability is the result of the prefetchers making predictions based on previous access patterns, which can create changes in state that attackers can exploit to leak information.

So, the encryption the chips use is solid, but some of the hardware employed can still leak data.

view more: next ›