[-] [email protected] 0 points 7 hours ago



What these manufacturers needs to do is to start embedding indicators for stress damage (common in industrial machinery, etc), but so far I haven't heard of anybody at all doing that in this industry. Until they do I don't trust it.

[-] [email protected] 2 points 7 hours ago

It takes quite a lot to get a judgement which extends beyond just barring the person from speaking about the victim again, and taking away their tools to speak. Despite how horrible this dude is, it's still not the kind of crime that causes the government to take silence him.

They'll have recourse available if he talks about the same victims again, but they don't have standing for shutting him up entirely.

[-] [email protected] 4 points 7 hours ago

That depends on how well Apple explained the features and behavior, IMHO. A lot of liability issues comes down to what expectations the seller has set for the buyer

[-] [email protected] 2 points 1 day ago


They have limited tolerance for heat that you can't solve without either improving cooling or reducing hard acceleration / deceleration (using additional material) when used in wheels. When used in frames you need to reduce stress points with very good dampening.

They can certainly be strong, but they have similarities to tempered glass where damage accumulates over time and can't self heal so they have a best before date built in.

[-] [email protected] 1 points 1 day ago

I Googled "motorcycle carbon fiber wheel" and autocomplete immediately suggested adding "failure" and doing that search has endless relevant results

[-] [email protected] 0 points 1 day ago

Carbon fiber has very limited lifetimes when used for something with a lot of hard impacts, so if you're not sticking to smooth surfaces the bike can literally split apart with little warning

[-] [email protected] 1 points 1 day ago

Not fully encrypted unless you enable lockdown mode (and losing various features)

[-] [email protected] 2 points 1 day ago

The perceptual hash algorithm was broken in hours, then so fully broken that modified images were visually indistinguishable from unmodified images, so you could send people images with hash values that match flagged photos.

Also, then there's the thing of the risk of various jurisdictions pushing for adding detection of other banned content.

[-] [email protected] 2 points 1 day ago

But once a process is running its trivial to get weeks of extremely detailed history and lots of secrets you thought were ephemeral

[-] [email protected] 7 points 1 day ago

Recall was set to be default on for everybody and to record everything in a database which is trivial to extract data from.

There's a lot of nonsense Apple is doing too (like the chatgpt integration) but they didn't put keylogger into the system.

[-] [email protected] 1 points 1 day ago* (last edited 1 day ago)

Neither of these mention networks, only protocols/schemes, which are concepts. Cryptography exists outside networks, and outside computer science (even if that is where it finds the most use).

This is ridiculous rules lawyering and isn't even done well. Such schemes inherently assume multiple communicating parties. Sure you might not need to have a network but you still have to have distinct devices and a communication link of some sort (because if you have a direct trusted channel you don't need cryptography)

You're also wrong about your interpretation.

Here's how to read it:

At point A both parties create their long term identity keys.

At point B they initiate a connection, and create session encryption keys with a key exchange algorithm (first half of PFS)

At point C they exchange information over the encrypted channel.

At point D the session keys are automatically deleted (second half of PFS)

At point E the long term key of one party is leaked. The contents from B and C can not be recovered because the session key is independent of the long term key and now deleted. This is forward secrecy. The adversary can't compromise it after the fact without breaking the whole algorithm, they have to attack the clients as the session is ongoing.

This is motivated for example by how SSL3.0 usually was used with a single fixed RSA keypair per server, letting user clients generate and submit session encryption keys - allowing a total break of all communications with the server of that key is comprised. Long term DH secrets were also often later used when they should be single use. Then we moved on to ECDH where generating new session secrets is fast and everybody adopted real PFS.

Yes compromising the key means you often get stuff like the database too, etc. Not the point! If you keep deleting sensitive data locally when you should then PFS guarantees it's actually gone, NSA can't store the traffic in their big data warehouse and hope to steal the key later to decrypt what you thought you deleted. It's actually gone.

And both of the above definitions you quoted means the same as the above.

In any case, both of these scenarios create an attack vector through which an adversary can get all of your old messages, which, whether you believe violates PFS by your chosen definition or not, does defeat its purpose (perhaps you prefer this phrasing to "break" or "breach").

Playing loose with definitions is how half of all broken cryptographic schemes ended up insecure and broken. Being precise with attack definitions allows for better analysis and better defenses.

Like how better analysis of common attacks on long running chats with PFS lead to "self healing" properties being developed to counter point-in-time leaks of session keys by repeatedly performing key exchanges, better protecting long term keys by for example making sure software like Signal make use of the OS provided hardware backed keystore for it, etc. All of this is modeled carefully and described with precise terms.

Edit: given modern sandbox techniques in phones, most malware and exploits doesn't survive a reboot. If malware can compromise your phone at a specific time but can't break the TPM then once you reboot and your app rekeys then the adversary no longer have access, and this can be demonstrated with mathematical proofs. That's self healing PFS.

Anyone can start a forum.

Fair point, but my cryptography forum (reddit.com/r/crypto) has regulars that include people writing the TLS specifications and other well known experts. They're hanging around because the forum is high quality, and I'm able to keep quality high because I can tell who's talking bullshit and who knows their stuff.

[-] [email protected] 5 points 1 day ago


Assuming it's a pun

submitted 1 week ago by [email protected] to c/world
view more: next ›


joined 10 months ago