Yeah that is fun, credit where it’s due, compilers do a lot of cool work behind the scenes.
Yeah that is fun, credit where it’s due, compilers do a lot of cool work behind the scenes.
I mean, the comic is fine I guess, but if it implies the Cpp lady is hitting you, it’s not. That would be the kernel, the lady did what you told her to do.
To be a pedantic dick, those aren’t really programming languages. Their purpose isn’t for writing at that level.
Java when you don’t put in a try catch, vs Template<typename T> in Cpp
I don’t know who needs to hear this, but Python, like most languages, can be as complex as you make it.
Brother, life is too short not to leave when you want.
When you’re a star, they let you do it.
Very informative, I think people will learn from what you’re saying, but it doesn’t really matter to what I’m saying.
Yes, absolutely, consider the human element in your data encryption and protection schemes and implementations.
Beating someone with a pipe is a joke, but not really defeating an algorithm.
I appreciate the explaination, that’s a cool scheme, but what I saying is the human leaking the key is not the fault of the algorithm.
Everyone and everything is, on a very pedantic level, weak to getting their ass beat lol
That doesn’t make it crypt analysis
Doesn’t break the algorithm though, you would just have the key and then can use the algorithm (that still works!) to decrypt data.
Also you’re talking about one class of cryptography, the concept of key knowledge varies between algorithms.
My point is an attacker having knowledge of the key is a compromise, not a successful break of the algorithm…
“the attacker beat my ass until I gave them the key”, doesn’t mean people should stop using AES or even RSA, for example.
No, really though, where’s it from?
Where is this from? I don’t think exposing the key breaks most crypto algorithms, it should still be doing its job.
I know this is supposed to be humorous, but there’s a reason why these languages can, and are doing what they’re doing.
Core dumps are also worth learning about, they’re really helpful if you understand them.
I’d say the purpose of the feature is to do as intended, ensure the documents authenticity and integrity. The mechanism still requires people trust your signature (public key), so you need another strategy to establish that trust. If you wanted to share a confidential document to a person you know on discord, and they already trust your discord profile, you would need to use said profile to get people to trust the key you’re going to use, belongs to and identifies you. This really isn’t different from third party Cas, just a lot of certificates from them are already trusted by default and part of the internet wide key infrastructure.
Does this function like RDP? It’s one of the better products to come out of Microsoft.
Not that you aren’t entitled to your opinion, but software running on a Tesla is, in many ways just as mallaible as code on a vacuum robot.
There are several challenges, but basically the protections stopping people from reading and writing firmware would need to be defeated.
I think there have been some software jailbreaks on earlier models already that have been patched, but software is complicated, it’s hard be bug free.