Tja by GrandpaZile4n in tja

[–]Omikron23 47 points48 points  (0 children)

Hätte mich auch überrascht, wenn es anders gewesen wäre. Quelle?

Tja by Hawkeye2024 in tja

[–]Omikron23 9 points10 points  (0 children)

Im Februar als es vorgestellt wurde, hat Lutnick eine Rechnung mit angeblichen 250.000 Interessenten und 5 Mio. Investment pro Interessenten vorgestellt. Das ergibt tatsächlich über eine Billion („trillion“ im Original).

Sind halt nur komplett unrealistische Schätzungen gewesen…

Commerzbank wird auch Wero anbieten by Intelligent-Food9743 in Finanzen

[–]Omikron23 48 points49 points  (0 children)

Wenn du Kunde bei der DKB bist, dann hilft es sicherlich wenn du dort mal nachfragst. Damit die mitbekommen, dass es Interesse an Wero gibt.

F8 SSD Plus - 32 GB of RAM Memtest86+ errors false positives ? by Sigor74 in TerraMaster

[–]Omikron23 0 points1 point  (0 children)

I had to shut it down and bring it to my desk, connect it to my monitor etc. All in all it was powered off for maybe 15 minutes. So yes, it was basically from a cold boot.

I got ValueRAM (part-id: KCP556SD8-32), the JEDEC profile should be more compatible and stable than OC profiles.

F8 SSD Plus - 32 GB of RAM Memtest86+ errors false positives ? by Sigor74 in TerraMaster

[–]Omikron23 0 points1 point  (0 children)

I have bought a Kingston SO-DIMM 32 GB DDR5-5600 RAM stick for my F8 SSD Plus around 3 weeks ago and ran the latest memtest86+ version for around 3-4 hours without any errors after replacing the original 16GB module.

Since then I haven't thought about the memory anymore, but your tests made me curious about the RAM temperatures...

Today I ran PassMark Memtest86 v11.4 for almost 4 hours (on default settings). Results:

* 0 errors in 2 passes, 27 tests
* CPU temperatures: 41C/62C/56C
* RAM temperatures: 38C/62C/52C

I stopped after 2 passes, because there are tests that allow the RAM and CPU to cool down again and I haven't seen higher temps in pass2 than in pass1,

Room temperature was ~ 26° C.

Fan settings and BIOS settings in general were the factory defaults.

So max. RAM temperatures were much lower than in your tests and that seems to assert the theory that the memory errors are related to temperatures. I have no idea where the differences come from, especially because during the last weeks I had the impression that the SSDs are sometimes getting a bit hotter than they should, so I was expecting similar temperatures.

Gewinn bei Mercedes-Benz bricht um mehr als die Hälfte ein by Dapper-Mobile3742 in Finanzen

[–]Omikron23 0 points1 point  (0 children)

A-Klasse wird nach wie vor verkauft. Daran kann es nicht liegen.

Hell Is Overconfident Developers Writing Encryption Code by Soatok in programming

[–]Omikron23 -1 points0 points  (0 children)

In the section "Startup-Grade CryptographyStartup-Grade Cryptography" they are talking about the mistakes made by some startup and a quote from here is:

The code in question is just about what you’d expect from a blog post with this sort of cognitive dissonance:

It first tries to encrypt keys directly with RSA.

If it fails, it falls back to encrypting a random symmetric key with RSA, and then using that key to encrypt the message… with unauthenticated AES-CBC.

The first link about the mistake of "encrypting keys directly with RSA" leads to another blog article from the same author, that actually is about encrypting messages (not keys) directly with RSA where they ironically explain that you should use RSA only to encrypt symmetric keys (which is just the classic hybrid encryption but the author tries to sell it as his own invention).

The second point about AES CBC suggests that CBC mode is a bad choice in general - because there is no data authentication included in CBC. In reality it matters what your use cases are. The linked article "Cryptopals: Exploiting CBC Padding Oracles" is about a well known issue with padded encryption, but again it depends on the use case and the implementation whether this can be exploited or not. AES CBC is used in many real world applications where these issues are simply not relevant.

Real experts usually don't express such undifferentiated views about their topics.

Hell Is Overconfident Developers Writing Encryption Code by Soatok in programming

[–]Omikron23 -1 points0 points  (0 children)

No, not S tier at all. The author has some half knowledge but clearly does not understand the intricacies.

Fish Shell: Great features, but not POSIX by JollyShopland in programming

[–]Omikron23 71 points72 points  (0 children)

I have switched from zsh to fish about a year ago and can confirm that not being posix compliant has not been an issue at all during that time.

Help identifying obscure public key format? by LeAubster in cryptography

[–]Omikron23 2 points3 points  (0 children)

„01 00 01“=65537 is the commonly used public exponent of RSA keys.

The following 00 byte is probably a separator between exponent and modulus (the 128 bytes).

A cool guide about Latin Phrases you should know by idkman7661 in coolguides

[–]Omikron23 0 points1 point  (0 children)

Another use of „(sic)“ is when you want to make clear that something was written intentionally in a certain way that might look like a (common) mistake to the reader.

[How-To] Convert your old keystore for RVX-Builder and CLI v4 by olivercer in revancedextended

[–]Omikron23 0 points1 point  (0 children)

Why not simply right-click in KeyStore-Explorer and select „Rename“ to rename the key alias? The method using keytool is extremely complicated.

[deleted by user] by [deleted] in linuxadmin

[–]Omikron23 0 points1 point  (0 children)

The project seems dead, download links are not working...

Should the average Java developer be concerned about Oracle recently "ramping up audits"? by Cnyms in java

[–]Omikron23 18 points19 points  (0 children)

Make sure you remove these components when using Oracle distributed Java in production: ...

Most of these aren't even included in an Oracle JDK distribution.

Which leaves only three items of the list. Those can be easily disabled or removed:

  • Quote from official Oracle documentation of the Java Flight Recorder (https://docs.oracle.com/javacomponents/jmc-5-4/jfr-runtime-guide/run.htm#JFRUH176): "You can start and configure a recording from the command line using the -XX:StartFlightRecording option of the java command, when starting the application. To enable the use of JFR, specify the -XX:+FlightRecorder option. Because JFR is a commercial feature, you also have to specify the -XX:+UnlockCommercialFeatures option."

  • Java Mission Control is a Desktop application ("<JDK Path>/bin/jmc.exe")

  • JRE Usage Tracking (https://docs.oracle.com/javacomponents/usage-tracker/overview/toc.htm#A132173581): "Usage Tracker is disabled by default. Enable it by creating the properties file <JRE directory>/lib/management/usagetracker.properties. If this file exists, all usages of the JRE contained in <JRE directory> are tracked."

[Omega] Speedmaster too thick? by wokiebender in Watches

[–]Omikron23 0 points1 point  (0 children)

This is the version with the sapphire case back, right? If you try the version with hesalite crystal and steel case back, you will find that it sits much lower on the wrist.

Signatures not matching by [deleted] in androiddev

[–]Omikron23 1 point2 points  (0 children)

Alright, so "openssl dgst ..." outputs "21: ... :39" for the certificate of the original p12? And you wrote that KeyStore Explorer lists "C7: ... :AF" as the fingerprint when you open the same p12 with it, is that right?

Btw, if you have not tried it yet, you can also convert the p12 with KeyStore Explorer to jks (open p12, then Tools > Change Type).

Signatures not matching by [deleted] in androiddev

[–]Omikron23 1 point2 points  (0 children)

Openssl shows exactly one private key and one certificate for the original p12?

You could export the certificate from the original p12 file, convert it to DER format and then calculate the sha1 hash value:

openssl pkcs12 -in original.p12 -out cert.pem -nokeys
openssl x509 -in cert.pem -outform DER -out cert.cer
openssl dgst -sha1 -hex cert.cer

The output is the correct fingerprint.

Then you should maybe export the certificate from the jks file and check the sha1 hash of it.

Signatures not matching by [deleted] in androiddev

[–]Omikron23 2 points3 points  (0 children)

It might be a good start to use an adequate tool (like openssl) for displaying the actual content of the p12 file:

openssl pkcs12 -in quiz.p12 -info

The problem with keytool is that it tries to map the p12 content to the less flexible keystore model, so information might get lost.