For the best experience on desktop, install the Chrome extension to track your reading on news.ycombinator.com
Hacker Newsnew | past | comments | ask | show | jobs | submit | history | PUSH_AX's commentsregister

Nothing has been broken yet, however data can be collected now and be cracked when the time comes, hence why there is a push.

Can a theoretical strong enough quantum computer break PFS?

QC breaks perfect forward secrecy schemes using non-PQC algorithms, same as for non-PFS. PFS schemes typically use single-use ephemeral DH/ECDH key pairs for symmetric key exchange, separate from the long-term signing keys for authentication.

This has to be an ad right? Affiliate link in the blog, non sensical reasoning for switching (single point of failure to... another single point of failure) etc

It's not, but I can see how it came across like that. I just wrote up my experience moving over, and I thought it was nice they had an affiliate link. I've cleaned it up and called out the affiliate link. Nothing shady intended.

> (single point of failure to... another single point of failure)

I feel like you missed what the author meant with that phrase. The author wasn't talking about for their website, but the internet as a whole.

> I can’t help but feel that the idea of centralizing the internet into a single US corporation feels off.

The point of picking Bunny.net is that it's alternative to this single entity that's got so much of the internet running through it, and is less susceptible to the BS in the US.


Yeah. I flagged this thread for spam.

People are voting with their wallets

Thats not democracy.

It's also not not democracy. It has little to do with a form of government.

>People are voting with their wallets

A handful of people's wallets are much deeper than vast swaths of the population. None of this AI shit would be happening without their funding.


Is Jq slow?


I'd pay to watch someone say this in a court of law...


https://www.law.cornell.edu/wex/reasonable_person

The concept most certainly exists.


The hardest part about any creativity is hiding your influences


This is poetry.


So they’re training a model


> There is so much money to be made repackaging open source these days

These days? Almost every tech offering in existence is 1000+ OSS dependencies gaffer taped together with a sprinkling of business logic.

Cursor isn't a shocking bit of software to pay for, its investment however...


Probably a country that has done so in the past, like the UK…


> how does one defend against an attacker or red-team who controls the CPU voltage rails

The xbox does have defences against this, the talk explicitly mentions rail monitoring defences intended to detect that kind of attack. It had a lot of them, and he had to build around them. The exploit succeeds because he found two glitch points that bypassed the timing randomisation and containment model.


I hope Apple is paying attention, since their first gen AirTags are vulnerable to voltage glitching to disable the speaker and the tracking warning.


I don't see much motivation for fixing that when I can purchase a nrf52xx Bluetooth Beacon on aliexpress for €4 and flash it with firmware that pretends to be 50 different airtags, rotating every 10 minutes, and therefore bypassing all tracker detections.


What's the battery life like on one of those?


Months if the firmware properly sleeps.


They're also, as it turns out, vulnerable to a drillbit


It's pretty trivial to just open it up and disconnect the speaker too. I took one apart to make a custom wallet card out of it and broke the speaker in doing so; the rest of it worked perfectly fine (though obviously the warning would still work).


Apple has a team that works on glitching protection for their phones. Disabling the speaker on AirTags is a very different threat model.


Isn't airtags completely and utterly broken, or has anything changed?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search:

HN For You