theterrasque

joined 2 years ago
[–] theterrasque@infosec.pub 16 points 4 months ago (2 children)

You fucking imbecile. If women are locked in the bedroom how can they make dinner?? Moran

[–] theterrasque@infosec.pub 1 points 4 months ago

Banks hate this simple trick

[–] theterrasque@infosec.pub 9 points 4 months ago (1 children)

Blowing up? Seen conservative discussion areas? Their godking is not only one of the working class now, but he owned all the democrats and made Harris look like a fool. He's a master troll doing 4d chess!

[–] theterrasque@infosec.pub 1 points 4 months ago

They built a space laser?

[–] theterrasque@infosec.pub 3 points 5 months ago

It’s a watch that says you have no taste.

They know their target demographic

[–] theterrasque@infosec.pub 3 points 5 months ago

Careful, if you spend 8 hours playing with your deck you might go blind

[–] theterrasque@infosec.pub 5 points 5 months ago (1 children)

Hah. Snake oil vendors will still sell snake oil, CEO will still be dazzled by fancy dinners and fast talking salesmen, and IT will still be tasked with keeping the crap running.

[–] theterrasque@infosec.pub 10 points 5 months ago (3 children)

This has a lot of "I can use the bus perfectly fine for my needs, so we should outlaw cars" energy to it.

There are several systems, like firewalls , switches, routers, proprietary systems and so on that only has a manual process for updating, that can't be easily automated.

[–] theterrasque@infosec.pub 3 points 5 months ago* (last edited 5 months ago)

Most phones these days use randomized MACs

https://www.guidingtech.com/what-is-mac-randomization-and-how-to-use-it-on-your-devices/

Not sure if that is for BT too, but looks like there is some support for it in the standards

https://novelbits.io/how-to-protect-the-privacy-of-your-bluetooth-low-energy-device/

https://novelbits.io/bluetooth-address-privacy-ble/

The recommendation per the Bluetooth specification is to have it change every 15 minutes (this is evident in all iOS devices).

So seems like it is implemented on some phones at least

https://www.bluetooth.com/blog/bluetooth-technology-protecting-your-privacy/

From 2015. So this seems to be a solved problem for a decade now

[–] theterrasque@infosec.pub 6 points 5 months ago

That's because they don't see the letters, but tokens instead. A token can be one letter, but is usually bigger. So what the llm sees might be something like

  • st
  • raw
  • be
  • r
  • r
  • y

When seeing it like that it's more obvious why the llm's are struggling with it

[–] theterrasque@infosec.pub 1 points 5 months ago

In many cases the key exchange (kex) for symmetric ciphers are done using slower asymmetric ciphers. Many of which are vulnerable to quantum algos to various degrees.

So even when attacking AES you'd ideally do it indirectly by targeting the kex.

view more: ‹ prev next ›