bamboo

joined 2 years ago
[–] bamboo@lemmy.blahaj.zone 6 points 6 days ago (2 children)

Again it was just a guess, but why would a company like Google just randomly freeze all the data for this one person for no reason? Feels like there has to be a cause and effect, and the only info we know of is that the backup to scrivener the day prior. Obviously they never had a problem before to amass all the documents in there, so what just happened to get banned?

I don't know the total file size or the tool used to pull the content from Google Drive. It could be that the behavior looked like file sharing to Google's servers and the policy is to shut it down while they investigate.

[–] bamboo@lemmy.blahaj.zone 9 points 6 days ago (11 children)

If I had to guess, what probably triggered the ToS violation was transferring the content the day before, maybe the method or client used to do the transfer was too aggressive.

[–] bamboo@lemmy.blahaj.zone 1 points 6 days ago

Finally the M42 will go faster than someone on a big wheel tricycle

[–] bamboo@lemmy.blahaj.zone 3 points 6 days ago

Pretty sure he'll be in Penn. state jail and not federal custody, so fortunately he can't get a presidential pardon.

[–] bamboo@lemmy.blahaj.zone 23 points 1 week ago

Yes, mostly from one end, but sometimes both.

[–] bamboo@lemmy.blahaj.zone 1 points 1 week ago (1 children)

Not really sure what you mean by reusing UUIDs but theres nothing bad about using UUIDs in URLs for content you don't want scrapped by bots. Sites like Google Photos are already are using UUIDs in the URL for the photos, and do not require any authentication to see the image as long as you have the URL. You can try this for yourself and copy the URL of an image and open it in a Private Browsing Window. Every so often someone realizes the actual image URL is public and think they've found a serious issue, but the reason why it isn't is because of the massive key space UUID provides and that it would be infeasible to check every possible URL, even if it's publicly available.

[–] bamboo@lemmy.blahaj.zone 2 points 1 week ago

Even assuming 0 latency on their backend, if you wanted to check each UUIDv4 value again their database during your lifetime, you would need to check 1.686 x 10^27 UUIDv4 per second for 100 years straight. Supercomputers are measured in exaflops, which is 10^18 operations per second, so even distributing the work across many machines, you would need about 1 billion of super computers to be able to have a chance of checking every UUIDv4 value within 100 years.

[–] bamboo@lemmy.blahaj.zone 7 points 1 week ago

Thank you for bringing sanity to this thread. At this point, I have to assume that this person is trolling? That or they've been vibecoding too long?

[–] bamboo@lemmy.blahaj.zone 5 points 1 week ago

a computer powerful enough can guess all possibilities in a matter of minutes, and query them all against the db to discover all files stored within.

Again, it would be computationally infeasible on any reasonable timescale of human existence. It's no secret what every possible UUID would be, it's the fact there are 5316911983139663491615228241121378303 of them and trying each one would be futile. They're actually all on https://everyuuid.com/ to see for yourself.

Just for shits, I encrypted a file with a password being a UUIDv4. Here's the encrypted file as base64:

YLIR6fL46HfRmueb1tZWiQUFQHYnZOKO9oujOzhvWYpfTtB5RnHtAvMgUgeIsffLC1wz7D17Vp0VT5YIJMb5pA==

Here's everything you would need to do to decrypt this file with a password:

$ echo "YLIR6fL46HfRmueb1tZWiQUFQHYnZOKO9oujOzhvWYpfTtB5RnHtAvMgUgeIsffLC1wz7D17Vp0VT5YIJMb5pA==" | base64 -d > file.enc

$ openssl enc -aes-128-cbc -d -nosalt -in file.enc
enter AES-128-CBC decryption password:
u/01189998819991197253@infosec.pub can't brute force this

The password to decrypt the file is a UUIDv4. See if you can try every UUID and figure out which one I used as the password.

[–] bamboo@lemmy.blahaj.zone 10 points 1 week ago (2 children)

I'm not familiar with NSA’s Translator, so any info would be appreciated.

I saw your other comment about DES, and it should be noted that DES was with a key length of 56 bits, and that was enforced precisely because the NSA could brute force it. It wasn't even a secret they could brute force 56 bit encryption, and written into law. Back then, if you wanted to use more than 56 bit encryption in the United States, you had to provide a key escrow system to allow the government to decrypt the content if they needed to. Around the 2000s with the rise of e-commerce, they dropped the export restriction because it was doing more harm than good. No one wanted to use so few bits in the encryption keys, but it was illegal at the time to write software which did.

A UUID's 122 bits of randomness are exponentially more than the 56 bits DES offered. My original point being, all crypto is inherently brute forceable on an infinite timescale, but key length and implementation decisions are chosen to so that it would be computationally infeasible to brute force.

[–] bamboo@lemmy.blahaj.zone 19 points 1 week ago (4 children)

By this logic, all crypto is bruteforcable, on a long enough timeline.

A 122 bit random number is 5316911983139663491615228241121378303 possible values. Even if it were possible to check 1 trillion records per second, it would take 168598173000000000 years to check all the UUIDs and get the info on all the users. Even if every human on earth signed up for the app (~8 billion people), and you wanted to just find any one valid UUID, the odds of a generating a UUID and that being valid in their DB is basically 0. You can do the math your self following the Birthday Paradox to determine how many times you would need to guess UUIDs before the probability that any one UUID is valid against a population of the whole world is greater than 50%.

[–] bamboo@lemmy.blahaj.zone 40 points 1 week ago (9 children)
50
Tom Rule (lemmy.blahaj.zone)
 
 

I'm not sure if this is a local issue, but I'm not able to load any thumbnail images. I keep getting a connection timed out.

Example URL: https://pictrs.blahaj.zone/pictrs/image/d3046f30-72da-4798-aacf-a5809e6872bd.jpeg?format=webp&thumbnail=256

Posting this is anyone is having similar experience today, or has advice.

 

watch this video...it's just loading now...just a sec...sorry laptop's a bit slow...I'll just refresh it one sec...are you using chrome?... you should probably use chrome...it says I've got full bars...have you got full bars on your phone?...maybe check the router it could be the router...nah the router is good... is it working on your phone?...yeah I sent you the link...yeah in messenger...yeah i sent it to the group chat...still not working?... yeah I dunno then.

 
9
submitted 2 years ago* (last edited 2 years ago) by bamboo@lemmy.blahaj.zone to c/videos@lemmy.world
 
these impressions feel so real

Featuring: Billy Langdon, Will Angus, Chet Collins, Liam Cullagh
Director: Skyler Fulton
Writers: Skyler Fulton, Billy Langdon
Producer: Joe Pomeroy
DP: Nick Massey 
Editor: Gerry Kenah 
Sound: Mike Roberston  
Production Design: Rick Mader
VFX: Scott Woodburn 
Color: Matt Tipold
Production Assistants: Dylan Walker & John Bastian

More from Almost Friday TV: https://www.youtube.com/@AlmostFridayTV

 

why can't he just freaking leave it.

Featuring: Will Angus and Jackie Green Director: Tyler Falbo Writers: Will Angus and Tyler Falbo Producer: Joe Pomeroy DP: Matt Tipold Gaffer: Nick Massey Production Design: Rick Mader Editor: Gerry Kenah Score: Stuart Leach Sound Design: Gerry Kenah Color: Matt Tipold Production Assistants: Dylan Walker, John Bastian, Ben Barrett and Noah Goldstein

view more: ‹ prev next ›