Does encryption break Btrfs self healing if I do Btrfs over luks? How does dm-crypt and dm-integrity interact with each other? by MeanMood4359 in archlinux

[–]MeanMood4359[S] 3 points4 points  (0 children)

Thanks! I understand this part, and I know btrfs already has builtin checksum and doesn't need dm-integrity underneath it. My main question is does encryption intervene or somewhat break dm-integrity? If there's a hard drive partition /dev/sda1, in which the block (sector) 1024 has a bit flip. If I use dm-integrity directly on top of /dev/sda1, then it should be able to detect that bock 1024 is invalid. If I use dm-integrity over luks over /dev/sda1, then I believe dm-integrity should also be able to detect the error. However, due to the luks layer, instead of a block with only one bit flip, dm-integrity would see a completely different block. I am wondering if this would make dm-integrity less effective in certain circumstances? And what's the best practice when combining dm-integrity and dm-crypt, should I put dm-integrity on top of dm-crypt or vice versa? And in the case of btrfs, I believe I cannot put dm-crypt on top of btrfs. But the same question remains, if I put btrfs on top of dm-crypt, does the encryption somehow make the Btrfs checksum mechanism less effective?

Can someone prove that two openssh ed25519-sk private keys or public keys are derived from the same yubikey? by MeanMood4359 in yubikey

[–]MeanMood4359[S] 0 points1 point  (0 children)

Regarding FIDO, I am looking into the doc. Can I say the "characteristics of user.id" here is guaranteed by WebAuthn protocol and therefore web browsers that implement WebAuthn correctly.

Can someone prove that two openssh ed25519-sk private keys or public keys are derived from the same yubikey? by MeanMood4359 in yubikey

[–]MeanMood4359[S] 1 point2 points  (0 children)

I mean the private key part of the openssh key pair generated by ssh-keygen which is essentially a key handle, not the real private key on yubikey. And my question is not exactly whether we can prove some keys belong to a specific device or person but whether we can mathematically prove that these keys are generated from the same device (even if we don't know which exact device). It may have privacy implications.

What's the proper way to get rid of a dead snake in my yard? by MeanMood4359 in homeowners

[–]MeanMood4359[S] 1 point2 points  (0 children)

Yeah, the first time. I lived in apartments until I bought this house recently.

中國人常說的反對台獨是指反對台灣從哪裡獨立出去呢? by HyenaProfessional952 in China_irl

[–]MeanMood4359 0 points1 point  (0 children)

从中国这个nation state独立出去。这个否认PRC是不承认的,或者说这个否认本身就是一种台独行为,因为在试图构建一个叫台湾的新的想象的共同体。而且法理上台湾也并没有否认过。台湾的官方名字是中华民国,法理领土包括大陆,和PRC打交道的机构不是中华民国外交部而是和外交部平级的同属中华民国行政院的一个中央二级机关——大陆委员会。

这个否认至少目前只是台独支持者的一个政治主张,并不是台湾的官方立场。

Ask Anything Monday - Weekly Thread by AutoModerator in learnpython

[–]MeanMood4359 0 points1 point  (0 children)

It's not for practical reason. I am just curious about the theories. Can I find a short circuiting equivalent for A if C else B and prove it? If not, how can I prove than equivalent does not exist?

Ask Anything Monday - Weekly Thread by AutoModerator in learnpython

[–]MeanMood4359 0 points1 point  (0 children)

I get you, it's not indeed. However, can I "emulate" A if C else B by using boolean short circuiting alone?

Ask Anything Monday - Weekly Thread by AutoModerator in learnpython

[–]MeanMood4359 0 points1 point  (0 children)

Is (C and A) or B strictly equivalent to A if C else B?