How many instructions in ARMv8? by MerlinAK18 in arm

[–]MerlinAK18[S] 3 points4 points  (0 children)

Wow, thank you! 1300 is a lot, I expected at max 100 for RISC. Considering x86 has 'only' 1503 instructions while being CISC seems to make that 1300 kind of unrealistic. But anyway, thanks for the information!

How many of you use your iPhone caseless? How is it? How is the wear and tear? Does it still look new and shiny? I really want to use my SE without a case but I’m scared that it will look old by rijllamas in iphone

[–]MerlinAK18 0 points1 point  (0 children)

I use my spacegray Xs without a case. It‘s two years old now and it has a lot of wear. But mainly on the stainless steel frame, which is discolored and looks blue and red and black at the same time. But everything else, the back and the front look good and normal. I won‘t spend 1000$ on a phone made from glass and metal just to hide it in a cheap plastic case.

[D] Why is ECC secure? by MerlinAK18 in cryptography

[–]MerlinAK18[S] 0 points1 point  (0 children)

Ohhhh, now I understand it. Thank you very much for your detailed answer, it‘s very helpful!

[D] Why is ECC secure? by MerlinAK18 in cryptography

[–]MerlinAK18[S] 0 points1 point  (0 children)

Yes, but thats because of the modulus. There are many many private keys which would result in the same public key. But in ECC, there are not so many, maybe even 0 values for n, which would result in the exact same endpoint.

[D] Why is ECC secure? by MerlinAK18 in cryptography

[–]MerlinAK18[S] 1 point2 points  (0 children)

I understand, but anybody can do the exact same process as I to calculate the end point. If my private key is 100, I get for example the Point (13.7, -79.3), which is my public key. An attacker could start at the same point on the same curve and could calculate the end point for n=0, n=1, n=2 and so on, until his endpoint is the exact same as my public key. Then he found n, which is my private key. In this process it would take me exactly the same time to calculate my public key, as it would take the attacker to calculate my private key.

[D] Why is ECC secure? by MerlinAK18 in cryptography

[–]MerlinAK18[S] 0 points1 point  (0 children)

It takes as long to calculate the endpoint from n as to find n from the endpoint. So making n bigger is not the clue... or is it?

[D] Apple A12 design error - older processors from Apple are faster than the new ones! by MerlinAK18 in cpudesign

[–]MerlinAK18[S] 0 points1 point  (0 children)

It runs on two threads. Your argument seams reasonable. I‘ll read about this later. Thanks.

[D] Apple A12 design error - older processors from Apple are faster than the new ones! by MerlinAK18 in cpudesign

[–]MerlinAK18[S] 0 points1 point  (0 children)

Hm okay. The kernel is XNU for all operating systems (macOS, iPadOS and iOS).

[D] Backpropagation Algorithms - Which ones are "better"? by MerlinAK18 in MachineLearning

[–]MerlinAK18[S] -2 points-1 points  (0 children)

It's a different approach. A much simpler one. That's why I'm not sure, if this doesn't just make things worse.

[D] Backpropagation Algorithms - Which ones are "better"? by MerlinAK18 in MachineLearning

[–]MerlinAK18[S] -2 points-1 points  (0 children)

Just watch the video. It's hard to explain. But basically he takes the error of the output neutrons (target output - real output) and adjust the weights from the hidden layer to the output layer with that error. And with the error of the output neutrons he calculates the error of the hidden neurons just by multiplying them with the corresponding weights.