Roe vs Wade being overturned is a big one lmao

  • ☭ 𝗚𝗿𝗮𝗶𝗻𝗘𝗮𝘁𝗲𝗿 ☭A
    link
    15
    edit-2
    2 years ago

    Mostly same as usual (although I didn’t know about a lot of it until this year…): Palestine is still occupied, Yemen is still under siege, Syria is still being attacked by Isnotrael and others, the NED/CIA/etc. continues their regime change efforts, and Amerikkka continues to provoke China and Russia. I’d say that the sanctions on Russia are actually a bigger deal than the Ukraine conflict by itself; the geopolitical changes have been mostly positive so far (IMO), but the European countries are making horrible decisions w.r.t. the workers (again, IMO, but I’m reasonably sure most of you would agree), Yemen is apparently being fucked even more by the increased fuel prices, and NATO continues to expand its rancid, pus-filled tentacles <small>(no offense to any cephalopods who may be reading this in the far future)</small>

    And there’s probably a shit-ton more that I have no clue about, especially in Africa and Asia

          • @holdengreen
            link
            32 years ago

            I’ve done a little bit of reading. I don’t trust AES-256 in the long term, they need to upgrade the standards.

              • @holdengreen
                link
                22 years ago

                Well reading this it tells that the key is very hard to guess, and the algorithm is solid enough that the key cannot be guessed by looking at the data… https://www.n-able.com/blog/aes-256-encryption-algorithm

                And the government and institutions use it so… https://www.clickssl.net/blog/256-bit-encryption

                Personally I am still paranoid tho about what might happen in the future. I think it’s reasonable to be in some cases where you are sharing sensitive data that you can’t afford to possibly be broken by governments or whoever in a decade or more from now.

                • @darkcalling
                  link
                  22 years ago

                  The thing to do with truly important data is to cascade algorithms. That is encrypt it using multiple algorithms so a failure in one in a cryptographic sense means they still need a failure in another and if the combined failures cannot shave off enough bits they still can’t get the data. AES is fairly strong and proven so I would use it as one of those encryption schemes. Ideally you’d do this with ciphers from multiple mutually hostile governments (one from Russia, one from US/NATO).

                  • comfy
                    link
                    fedilink
                    1
                    edit-2
                    2 years ago

                    nah nah nah just roll your own crypto

                    (Only half joking: worthless in a targeted attack but effective over unmanned dragnet)

                  • @holdengreen
                    link
                    12 years ago

                    Yea I figure if you have anything truly important or prone to being targeted then… It doesn’t cost you much to over do it compared to not.

        • @darkcalling
          link
          22 years ago

          Depends on what schemes you mean. Stuff like RSA which relies on unsolveable math problems, yes that’s fucked so in theory a lot of HTTPS web traffic will in future be deciphered by the NSA if they’ve been storing it (they have been for a while now). But things like AES-256 as someone mentioned, certain other schemes should be quantum safe.

          Put it this way, a good strong password on AES-256 encryption can put you at a cracking time of hundreds of millions of years. Shaving off even 95% of that time with quantum computing wouldn’t be helpful because you’d still be looking at millions of years of cracking effort. In practice anything that puts cracking time beyond two decades or so of effort is something that protects the data because nothing but a formula for time travel is going to be of that much value to governments to spend such an amount of time dedicating a massive array just to cracking it. In practice LEO will usually give up on cracking something after perhaps 12-16 months of efforts and declare it failed. NSA and so on have more or less given up on cracking actually strong encryption so much as trying to subvert and weaken implementations with bad math and much more broadly just moving to straight up hacking victims and putting malware to grab the data before its encrypted.

          AES has certain problems with it, there are methods for shaving off a certain amount of bits but even these when considered against a strong implementation (in terms of passwords we’re talking >=20 characters, upper/lower case, digits, symbols) don’t really put it within the realm of truly broken in a reasonable time frame as I mentioned above.

      • @201dberg
        link
        72 years ago

        They will use the for stupid shit too like some even more ridiculous stock trading scheme that won’t do anything but make an already hyper unstable system even more unstable. Mark my words “quantum instability in the market” will be in some news article somewhere eventually.

      • @kretenkobr2
        link
        22 years ago

        Quantum computers are highly specialized. You cannot run Arma 3 on it 10 times more efficiently or something, it would actually not be able to run at all. It is similar to analog vs digital computer. Analog computers are insanely efficient and fast, but they are also incredibly specialized. They are effectively simulations, systems made to be analogous to a system which you need. Similarly qbits are just analogous to quantum systems, but that is about it. We have a long way to go to form a single good quantum computer.