Natanael

joined 1 year ago
[–] Natanael 7 points 2 months ago* (last edited 2 months ago)

Real-time in computing usually either means a real-time OS with guaranteed low latency response (typically for stuff like microcontrollers regulating machines) or streaming live data (low latency delivery of the most recent value)

This sounds like the latter, and a typical SQL database don't guarantee real-time updates (you can have "atomic writes" to prevent inconsistency but usually this would make it slower) but some databases like this one are designed to ensure you can read out updated correct and consistent values much faster. Also with standard databases you usually make scheduled individual requests, but a real-time database could often send a stream of updated values to a "subscribing" program

[–] Natanael 1 points 2 months ago

The question is if it wins then more support than they lose.

[–] Natanael 4 points 2 months ago

The "trick" is conservatives want to preserve a past that didn't exist, they've been told fairytales

[–] Natanael 6 points 2 months ago

They're targeting anybody who challenges their authority, starting with people who look different (foreigners first)

[–] Natanael 3 points 2 months ago

A gov accounts mute / block list, for example

[–] Natanael 4 points 2 months ago (1 children)

Yes, but without federation

[–] Natanael 32 points 2 months ago (2 children)

The verification doesn't work like on Twitter, it's just proving the identity, it's not some flag of prominence.

There's even multiple organizations who can issue verifications on bluesky, for example newspapers can act as verifiers of their own staff;

https://bsky.social/about/blog/04-21-2025-verification

[–] Natanael 3 points 2 months ago* (last edited 2 months ago)

It's actually kinda easy. Neural networks are just weirder than usual logic gate circuits. You can program them just the same and insert explicit controlled logic and deterministic behavior. To somebody who don't know the details of LLM training, they wouldn't be able to tell much of a difference. It will be packaged as a bundle of node weights and work with the same interfaces and all.

The reason that doesn't work well if you try to insert strict logic into a traditional LLM despite the node properties being well known is because of how intricately interwoven and mutually dependent all the different parts of the network is (that's why it's a LARGE language model). You can't just arbitrarily edit anything or insert more nodes or replace logic, you don't know what you might break. It's easier to place inserted logic outside of the LLM network and train the model to interact with it ("tool use").

[–] Natanael 2 points 2 months ago

If you're in the US, the medical bills might cost you more than both

[–] Natanael 11 points 2 months ago

But then the bear would still have to be afraid of honeypots

[–] Natanael -1 points 2 months ago (6 children)

If you asked people about their policies and literally absolutely anything they wanted to do, and hid the names, Trump always lost because he is MORE unpopular

Media helped Trump steal credit for things others did, instill fear of things his opponents never would do, etc. Nobody lost to Trump by being a worse candidate, but because media refused to be honest and people believed the lies

[–] Natanael 2 points 2 months ago

ICE already says their facial recognition app is more accurate than your actual citizenship papers.

12
submitted 1 year ago* (last edited 1 year ago) by Natanael to c/crypto
 

UK wanted global access to decrypt any and all Apple users' iCloud data on request. Apple pulled iCloud encryption from the ADP program instead within UK.

Seems like their idea is to ensure encrypted data outside of UK stays out of UK jurisdiction because the affected feature isn't available there anymore. But this will prevent UK residents from using iCloud end to end encryption in ADP and keeping for example backups of photos and iMessage logs protected, so for example journalists are a lot more exposed to secret warrants and potential insider threats.

9
submitted 1 year ago* (last edited 1 year ago) by Natanael to c/crypto
 

Here's a copy of my own comment from the reddit thread;

Randomness is a property of a source, not of a number. Numbers are not random. Randomness is a distribution of possibilities and a chance based selection of an option from the possibilities.

What we use in cryptography to describe numbers coming from an RNG is entropy expressed in bits - roughly the (base 2 log of) number of equivalent unique possible values, a measure of how difficult it is to predict.

It's also extremely important to keep in mind that RNG algorithms are deterministic. Their behavior will repeat exactly given the same seed value. Given this you can not increase entropy with any kind of RNG algorithm. The entropy is defined exactly by the inputs to the algorithm.

Given this, the entropy of random numbers generated using a password as a seed value is equivalent to the entropy of the password itself, and the entropy of an encrypted message is the entropy of the key + entropy of the message. Encrypting a gigabyte of zeroes with a key has the total entropy of the key + "0" + length in bits, which is far less than the gigabytes worth of bits it produced, so instead of 8 billion bits of entropy, it's 128 + ~1 + 33 bits of entropy.

Then we get to kolgomorov complexity and computational complexity, in other words the shortest way to describe a number. This is also related to compression. The vast majority of numbers have high complexity which can not be described in full with a shorter number, they can not be compressed, and because of this a typical statistical test for randomness would say it passes with a certain probability (given the tests themselves can be encoded as shorter numbers), because the highest complexity test has too low complexity to have a high chance of describing the tested number.

(sidenote 1: The security of encryption depends on mixing in the key with the message sufficiently well that you can't derive the message without knowing the key - the complexity is high - and that the key is too big to bruteforce)
(sidenote 2: the kolgomorov complexity of a securely encrypted message is roughly the entropy + algorithm complexity, but for a weak algorithm it's less because leaking patterns lets you circumvent bruteforcing the key entropy - also we generally discount the algorithm itself as it's expected to be known. Computational complexity is essentially defined by expected runtime of attacks.)

And test suites are bounded. They all have an expected running time, and may be able to fit maybe 20-30 bits of complexity in there, because that's how much much compute resources you can put into a standardized test suite. This means all numbers with a pattern which requires more bits to describe will pass with a high probability.

... And this is why standard tests are easy to fool!

All you have to do is to create an algorithm with 1 more bit of complexity than the limit of the test and now your statistical tests will pass, because while algorithms with 15 bits of complexity will generally fail another bad algorithm with ~35 bits of complexity (above a hypothetical test threshold of 30) will frequently pass despite being insecure.

So if your encryption algorithm doesn't reach beyond the minimum cryptographic thresholds (roughly 100 bits of computational complexity, roughly equivalent to same bits of kolgomorov complexity*), and maybe just hit 35 bits, then your encrypted messages aren't complex enough to resist dedicated cryptoanalysis, and especially not if the adversary knows the algorithm already, even though they pass all standards tests.

What's worse is the attack might even be incredibly efficient once known (nothing says the 35 bit complexity attack has to be slow, it might simply be a 35 bit derived constant folding the rest of the algorithm down to nothing)!

* kolgomorov complexity doesn't account for different costs for memory usage versus processing power, nor for memory latency, so memory is often more expensive

view more: ‹ prev next ›