• 0 Posts
  • 20 Comments
Joined 2 years ago
cake
Cake day: June 23rd, 2023

help-circle

  • Well I haven’t see the arguement for why Quantum resistent encryption would somehow be weaker to traditional cryptographic techniques. I understand that early “quantum encryption” alogrithms were flawed, and it’ll probably be a long time before we get the DES of Quantum Encryption. But all that means is that we don’t have vetted “strong” quantum encryption techniques yet, and should stick with traditional encryption since quantum encryption isn’t worth it yet. If Quantum encryption becomes worthwhile, we shouldn’t have “traditional encryption”, because it will be obsolete.

    If the first cylinder lock was easily bypassed compared to my old reliable wafer lock, then why should I use the cylinder lock at all? Now that cylinder locks are better then wafer locks why should I use a tumbler lock at all? There is no added security by using a wafer lock.


  • You can always encrypt the payload twice if you want. But really what are you arguing? That every time you encrypt something, you should encrypt it serially with all known encryption algorithms “just in case?” Hell why not do it again just to make sure?

    A key component of encryption is efficiency. Most cryptographic processes are going to be occurring billions of times across billions of transactions and involving billions of systems. It’s worthwhile for robust encryption algorithms to be efficient and avoid unnecessary calculations unless those calculations demonstrate some advantage. For example PBKDF2, where the multiple rounds of identical encryption convey a demonstrable increase in time to decrypt via brute-force mechanisms. If the standard is 4096 which it was in 2005, you coming along and saying, but why isn’t it 4097? The CIA is using >4096, therefore that means that 4096 is insecure! Isn’t really understanding why 4096 was chosen to begin with. Additionally no one is stopping you from using one million iterations with key1 and then doing another million rounds with key2.





  • “Clean Coal” has been an extraction industry green washing of Coal/Natural Gas/etc since the 90’s. While there does exist a technique that captures the majority of Coal Particulates and storing the CO2, it isn’t economically feasible (it’s cheaper to just not use coal at all.) However since there isn’t an interest in NOT using coal, the mining industries have been pushing the concept of clean coal. And then letting the public assume that Coal is now clean. This isn’t the coal from the old days, this is new futuristic “Clean Coal.”

    https://www.popularmechanics.com/technology/infrastructure/news/a27886/how-does-clean-coal-work/

    A example of industry green washing article. Nothing they say is a “lie” per se, however the lies are in the omission and lack of comparisons to how much CO2 could be captured, vs how much is actually produced. In addition to the lack of cost-comparison for retrofitting coal plants, vs building new Nuclear Plants or even Gas plants.

    From the article:

    A 2019 report from the Global CSS Institute estimates it could cost “$100 billion annually” to develop CCS, and that the technology represents “a classic catch-22 scenario.

    100-billion a year can build A LOT of Nuclear Plants, let alone Solar Panels, Wind Farms, etc.




  • PowerCrazy@lemmy.mltoPrivacy@lemmy.ml'Dumbphones' Are Not Private
    link
    fedilink
    English
    arrow-up
    35
    arrow-down
    4
    ·
    27 days ago

    It comes down to the hostile actor you are trying to defend against. If you are Jason Bourne and you have been burned by your agency so multiple nation-states are looking for you, then you have to go fully off-grid and live a quiet life without ever communicating with anyone in your prior life again. It doesn’t matter if you are using Signal, or SMS, or even a dial-up BBS. If you are communicating with people that are also under heavy surveillance, you cannot hide.

    If you want to reduce your “digital footprint,” then not using google/facebook/other social media is the most worthwhile thing you can possibly do. Your phone doesn’t matter. Use iOS, never install any of the social apps, use Safari in incognito mode, and you’ll never be tracekd across websites again.



  • PowerCrazy@lemmy.mltohomelab@lemmy.mlSwapping to POE switch
    link
    fedilink
    English
    arrow-up
    11
    ·
    1 month ago

    Yes. There won’t be a problem, assuming that the devices in question are indeed ethernet devices and not just using cat5 wiring. That said you will need to be aware about what kind of PoE device you are plugging in. There are several evolutions of the PoE standard.
    802.3af 802.3at 802.3bt

    So make sure that if the devices requires 802.3at, the switch is rated to provide that.









  • Self-approval leads to a road of sadness. For example, a theoretical company needs to self-renew an ssl cert. No problem, the cert will be stored with the rest of the secrets and retrieved in a secure way on deployment. Unfortunately if you don’t store the cert key in a secure way, the deployment still works fine and you don’t need to figure out the “onerous” encryption process.

    So you push the private key to the company git repo, and then deploy the cert! Done and Done.