• 0 Posts
  • 24 Comments
Joined 1 year ago
cake
Cake day: August 14th, 2023

help-circle
  • During World War II, the telegraph interception guys would figure out which enemy units were where, even without having broken the codes, because each telegraph operators each had their own “fist,” or distinct patterns in how they punched in the Morse code, and people listening to the signals day in and day out could learn to distinguish them even when dealing entirely in encrypted text.

    In modern times, attribution of hacker groups include other indicators include what time zones certain people seem to be active in, what their targets are (and aren’t), hints about installed language support or keyboard layouts or preferred punctuation or localized representations of numbers. For example, you can tell here on Lemmy when someone uses different types of quotation marks a decent indication of what country that person might be from, even in a totally English language thread.


  • I get how it works with wifi connections, and Bluetooth scanning (since that’s a peer to peer protocol that needs to broadcast its availability), and obviously the OS-level location services, but I’m still not seeing how seeing wifi beacons would reveal anything. For one, pretty much every mobile device OS now uses MAC randomization so that your wifi activity on one network can’t be correlated with another. And for another, I think the BSSID scanning protocol is listen only for client devices.

    Happy to be proven wrong, and to learn more, but the article linked doesn’t seem to explain anything on this particular supposed threat.













  • Plus they’re cheaper, relative to repair professionals’ labor.

    If a new refrigerator costs the same as 100 hours of skilled labor, then a 10 hour repair job (plus parts that cost the same as 1/10 of a refrigerator) will be economically feasible.

    But if a new fridge costs the same as 20 hours of skilled labor, and the more complex parts come in more expensive assemblies, then there’s gonna be more jobs don’t pass a cost benefit threshold. As a category, refrigerator repair becomes unfeasible, and then nobody gets skilled in that field.



  • not meant to be consistent with the human eye.

    Even then, postprocessing is inevitable.

    As the white/gold versus blue/black dress debate showed, our perception of color is heavily influenced by context, and is more than just a simple algorithm of which rods and cone cells were activated while viewing an image.


  • It basically varies from chip to chip, and program to program.

    Speculative execution is when a program hits some kind of branch (like an if-then statement) and the CPU just goes ahead and calculates as if it’s true, and progresses down that line until it learns “oh wait it was false, just scrub all that work I did so far down this branch.” So it really depends on what that specific chip was doing in that moment, for that specific program.

    It’s a very real performance boost for normal operations, but for cryptographic operations you want every function to perform in exactly the same amount of time, so that something outside that program can’t see how long it took and infer secret information.

    These timing/side channel attacks generally work like this: imagine you have a program that tests if variable X is a prime number, by testing if every number smaller than X can divide evenly, from 2 on to X. Well, the bigger X is, the longer that particular function will take. So if the function takes a really long time, you’ve got a pretty good idea of what X is. So if you have a separate program that isn’t allowed to read the value of X, but can watch another program operate on X, you might be able to learn bits of information about X.

    Patches for these vulnerabilities changes the software to make those programs/function in fixed time, but then you lose all the efficiency gains of being able to finish faster, when you slow the program down to the weakest link, so to speak.


  • This particular class of vulnerabilities, where modern processors try to predict what operations might come next and perform them before they’re actually needed, has been found in basically all modern CPUs/GPUs. Spectre/Meldown, Downfall, Retbleed, etc., are all a class of hardware vulnerabilities that can leak crypographic secrets. Patching them generally slows down performance considerably, because the actual hardware vulnerability can’t be fixed directly.

    It’s not even the first one for the Apple M-series chips. PACMAN was a vulnerability in M1 chips.

    Researchers will almost certainly continue to find these, in all major vendors’ CPUs.



  • Oh come on you don’t actually believe we should structure the entire system around such a minority use case

    Minority use case? I’m talking about how downvotes are useful for communities to enforce their own norms, or ensure that erroneous information is excluded. Someone who insists on a proof that the angles of a triangle add up to more than 180º is probably going to get downvoted, especially if he’s being an asshole about it. Same with someone who insists that the common cold is caused by exposure to cold air, or that the earth is flat.

    Or there are broad consensus beliefs about what is or isn’t off topic for a discussion, what types of insults break the forum rules on civility, etc. When a community largely agrees that someone is being an asshole for using racial slurs, downvotes quickly sort that out. In other words, toxicity can get filtered out through the downvote/hide mechanism, as well.

    Even for beliefs that are simply matters of opinion/taste/preference, the community can decide what’s actually up for debate and what’s not, within that space. A forum dedicated to fans of Real Madrid doesn’t have to tolerate trolls coming in and saying “Real Madrid sucks” or “lol soccer is a stupid sport you Europeans are so stupid” or “sports are dumb.” Same with a vegan forum downvoting someone’s brisket recipe (or a BBQ forum downvoting a “meat is murder” manifesto). These “echo chambers” are just how people organize with people who share their interests, and it’s weird not to be able to see that there’s value in those communities.

    So yeah, I think that you have a problem with people’s desire to organize into groups of similar interests, not with the actual mechanism by which those groups enforce those norms. It wouldn’t be any better with a mod-enforced echo chamber, either.