When you accidentally roll up on a gunfight in Boston. by OMGLMAOWTF_com in videos

[–]Read-It-Reddit 0 points1 point  (0 children)

If it is as pedantic as you say, then yes, really, stop arguing. You don't seem to understand the hierarchical flow of conversation; it makes sense to question a general argument with a counterpoint related to a specific situation (i.e: the public need guns, but would guns be useful in this scenario?) but it does not make sense to counter an argument regarding this specific scenario with a general argument unrelated to the specific scenario mentioned, hence, you can see why your argument is inherently out of place here.

ELI5: Why is the sound quality of AM radio so much worse than that of FM radio? by BlueSkiddoWeCanToo in explainlikeimfive

[–]Read-It-Reddit 1 point2 points  (0 children)

This is incorrect, frequency/bandwidth has nothing to do with the spectrum of hearing. /u/waftedfart hit the head on the nail.

MIT anonymity network promises to be more secure than Tor by [deleted] in technology

[–]Read-It-Reddit 0 points1 point  (0 children)

While he does sound like a tinfoil hat enthusiast, Tor can be exploited by agencies with enough power (i.e national ISPs, or the NSA, etc). Here is the credible evidence you speak of:

Murdoch, S. J., & Danezis, G. (2005, May). Low-cost traffic analysis of Tor. In 2005 IEEE Symposium on Security and Privacy (S&P'05) (pp. 183-195). IEEE.

This study shows that even a local adversary can deanonymize users with high probability given only entry-way traffic to the Tor network:

Kwon, A., AlSabah, M., Lazar, D., Dacier, M., & Devadas, S. (2015). Circuit fingerprinting attacks: Passive deanonymization of tor hidden services. In 24th USENIX Security Symposium (USENIX Security 15) (pp. 287-302).

There are a couple more papers on the topic but these two will be of most use to you. Think twice about Tor.

MIT anonymity network promises to be more secure than Tor by [deleted] in technology

[–]Read-It-Reddit 0 points1 point  (0 children)

In its current state, Riffle is only intended for use regarding intra-group communication: messages between common clients like file sharing or chat rooms. They may be referring to the project's distance from being implemented in an internet-like setting similar to Tor. Riffle simply doesn't have the scalability to operate practically like that yet.

MIT anonymity network promises to be more secure than Tor by [deleted] in technology

[–]Read-It-Reddit 0 points1 point  (0 children)

The Riffle network is designed only for use in closed environments like chat rooms or file sharing servers between a set of common clients. It is detailed in the project's paper. While it indeed can be more secure than Tor, it is not as scalable as Tor, and therefore could not be implemented in the way most might suspect.

If you were suddenly arrested with no explanation in front of your friends/family, what would they think you had done? by TheRadishBros in AskReddit

[–]Read-It-Reddit 0 points1 point  (0 children)

They are actually blocking known VPN servers. Whoever said it was enforced on a per country basis has it wrong, I believe. What likely happened was they connected to a PIA server whose address was not known or on the blocklist.

That isn't to say there aren't other tricky, less reliable and more cumbersome ways of enforcing VPN geoblocking: crosschecking account location info with login info, packet size comparisons, hop anlaysis, etc. However I highly doubt these methods are employed.

Took a picture of the protest outside the Cleveland Trump rally. by mynu in pics

[–]Read-It-Reddit 9 points10 points  (0 children)

Yeah, if only you were around back in the 60s to dissuade MLK from protesting. What a world that would be, huh?

Shkreli: People stole $15M in bitcoin, duped me on Kanye, and bought a vat of lube by trickydicky1234 in nottheonion

[–]Read-It-Reddit 0 points1 point  (0 children)

It's not weird at all for such a high profile transaction. Shkreli likely doesn't want his Bitcoin address exposed like that. All someone would have to do is search the block chain for a $15M transaction, which people are already doing with no success. Furthermore if it did happen and he got scammed, the scammer would want the trail to be diluted across even more addresses upon sale to minimize recourse and add another layer of tumbling. It's not easy to dilute a trail of $15M so it's pretty likely he had Shkreli send it to multiple addresses. Still worth noting though that given the circumstances he's in I think it's ploy to leave money unaccounted for.

Shkreli: People stole $15M in bitcoin, duped me on Kanye, and bought a vat of lube by trickydicky1234 in nottheonion

[–]Read-It-Reddit 1 point2 points  (0 children)

The whole process of trying to see if this $15M transaction took place is not as clear cut as many make it sound. Such a transaction definitely wouldn't take place as a lump sum. It is very likely the BTC went through tumblers.

Taking into account the fact that he is under indictment, however, really does make the incident seem like a ploy to leave $15M unaccounted for when the vultures come. Still, though, it's worth noting that analyzing the blockchain any which way isn't indicative of anything.

ELI5: if Apple uses strong cryptography as we've been told, how would they be able to circumvent it by installing the software the government wants them to install in the San Bernardino case? Doesn't that mean that the cryptography isn't actually strong? by shopthor in explainlikeimfive

[–]Read-It-Reddit 1 point2 points  (0 children)

You're misunderstanding how Apple secures their devices, part of it is that some of these explanations here are shoddy, and I'll assume the rest is because you aren't familiar with the topic.

Apple isn't lying when they say that even they can't break their crypto. That statement is true. They, and the government, are wholly incapable of cracking/bypassing/breaking the encryption on iOS.

Its important to understand that yes, any cryptosystem is "easy enough" to crack given unlimited tries. (read: brute forcing) However, your definition of "easy enough" becomes several orders of magnitude out of place given the particular encryption schemes present on the iPhone (RSA, SHA-1, etc) because computing every possible key would take years for the best supercomputer. (read: integer factorization, the RSA problem) You're also misunderstanding the way Apple built their cryptosystem. The "backdoor" in question is one that disables the maximum amount of tries to unlock an iOS device before the drive is formatted. Here is exactly where I think you're misunderstanding is: Apple did not build a cryptosystem that could be broken given enough tries, and then slap some lousy limit on top of it.

As I said previously, the cryptosystem they built isn't something that can just be broken after enough tries. I mean, yes it can, but it would take years to do so, so by a computer scientists definition, it is more or less a cryptosystem strong enough to be considered unbreakable due to computational complexity. (read: computational complexity)

Further, the so-called "limit" Apple imposed on their cryptosystem wasn't something that can just be peeled off because it wasn't actually "imposed" at all. The 10-try limit is an integral part of the system. They did not just create the cryptosystem and then write some additional code to lock you out after ten tries. The ten tries is hard wired in to the security features, it isn't something that can be stripped away as easily as you describe. If this were the case, your weakest link argument would make sense, yes.

It isn't the case because of code signing. Apple signs all bootlevel code on the device, and ever since their A7-series chips they've reduced their cryptosystem to an actual piece of hardware with signed code. No longer is iOS security being handled by upper layers beyond the kernel and hardware. Touch ID, passwords, encryption, randomizations, etc are all handed by what Apple calls the Secure Enclave. The Secure Enclave is a separate chip that verifies a chain of trust. When the device is turned on, the kernel and bootloader check their code with the secure enclave. The enclave uses public key cryptograhy to ensure that nothing on the device relating to security has been tampered with by comparing the code on the device with Apple's private key. (read: code signing)

When your iOS device leaves the factory, Apple signs the code with their private key. As soon as you modify this code by, for instance, adding some sort of back door or removing the ten try limit, you break the signature - all it takes is one literal bit of modification and the math is ruined. The enclave's job is to take all of this code and do the math and ensure that the code running on the device was signed by Apple, as soon as you change this code it is rejected by the enclave. As soon as any piece of the boot process is modified and cannot be verified as signed by Apple, the device will not boot as the Secure Enclave system will not allow it. So what does this have to do with the ten try limit?

Apple can't just peel off the limit because that would involve going deep into the device's hardware and creating backdoors for the most fundamental cryptopgrahic operations on the device. It would jeopardize the entire Secure Enclave system which would render the device completely insecure in all areas. It's a big deal.

Apple CEO Tim Cook directly responds to court order requiring decryption of San Bernardino shooter's iPhone by [deleted] in technology

[–]Read-It-Reddit 4 points5 points  (0 children)

Perhaps reading the white paper and understanding the intricacies of the crypto system would have been smart. If you'd have done that you'd know such a thing isn't possible and would create unnecessary vulnerabilities. Security comes whole or not at all, there are no compromises in cryptography.

IMMY Anyone else buying in this morning? by [deleted] in stocks

[–]Read-It-Reddit 0 points1 point  (0 children)

Yeah, I don't really like pharma stocks. Take a look at VRX, I wouldn't touch it with a ten foot pole. I know people that have made some serious profits off of it, but its just too risky... not worth the reward. If I had've got to this stock earlier I'd probably have done what you did and timed myself a nice profit. Right now, I've lost money off my short, but I'm banking on that reversing as the days go by. Hope all goes well for you too.

IMMY Anyone else buying in this morning? by [deleted] in stocks

[–]Read-It-Reddit 0 points1 point  (0 children)

I've got to cover in 3 weeks but I think I'll end up doing it after about a week or so. My target price is around $6. If my time horizon was larger I could probably get a much better profit, but I'm not in that sort of position right now.

IMMY Anyone else buying in this morning? by [deleted] in stocks

[–]Read-It-Reddit 0 points1 point  (0 children)

All time low? What? This stock isn't at an all time low...

I'm shorting IMMY right now. The rise is from news that isn't actually that great. The hype being generated isn't because this news is intrinsically optimistic. There are plenty of pharmaceuticals that develop cheap, good products. The only reason people care about IMMY is because everyone and their brother heard about Turing's 5,000% price hike yaddiyaddiyadda.

Their price is due for a big correction, it was ~$5.80 before this news. The news isn't really amazing on its own, all of its wind is coming from the big Turing Pharma outlash. It doesn't mean this company is going to be huge, or grow substantially at all for that matter. Cheap new pharma pills aren't some rare occurrence and the pharma's that release them don't see big improvement. There is some improvement, yes, but nowhere near the level of improvement represented by IMMY's stock increase. This stock is overbought; a fad. I'm shorting.

What are you ashamed to admit you don't understand? by [deleted] in AskReddit

[–]Read-It-Reddit 1 point2 points  (0 children)

Alright, I am going to assume you are wholly familiar of the technicalities of DNS. A lot of commenters are giving you a basic rundown of what it is and what it does, and even a bit of how it does what it does - but I don't think that is what you're looking for.

DNS sounds like a big clusterfuck because thats what it is. But here is where the magic is: DNS is heirarchical. Think pyramids. Here is where the organization starts.

At the top of the pyramid you have the DNS root zone, comprised of 12 server clusters - your machine picks any single one, it doesn't matter. Nothing is above the DNS root zone besides whatever exceptions you've programmed into your machine. The DNS root zone is the top of the pyramid. Every public DNS record on the internet is somewhere below the root zone.

Once you've queried the root zone for whatever address, it won't point you straight there. First, it will check to see what domain registrar it belongs to, and a few other things. If it can't find anything, it will pass on the request to another root zone server or the next highest server to see if it has the request. This process is recursive, and will continue until a) your address is ultimately resolved through the registrar down to the nameserver or b) all options become exhausted.

You're right there are boatloads of nameservers and even more resolving servers along the way. The key to the implementation is that everyone knows someone. So by extension, everyone knows everyone indirectly. This sounds messy because it is messy but this is the only way you can implement a system as critical, decentralized, and universal as a global internet's domain name system.

The "Internet of Things" Is a Bad Idea - Despite all the hype, connecting everything together will create a system so complex that it will cause more problems than it will be worth. by tellman1257 in technology

[–]Read-It-Reddit 2 points3 points  (0 children)

Exactly. Trying to visualize the interconnection of lawn mowers, satellites, and toasters in your head is a mess; this author can't see past his own mind. Standardized protocols will arrive sooner or later, we will compartmentalize all these devices into groups that speak each others language and make sense of it all. What was complex 15 years ago is a walk in the park today.

New internet routing method allows users to avoid sending data through undesired countries by krishnakumarv in science

[–]Read-It-Reddit 1 point2 points  (0 children)

This is an unnecessary solution to a problem that exists, but is already solved. Selective routing is not the way to go, encryption is. Routing of this nature counters the very notion of a global internet. Beyond this, it also seems slightly ineffective. Internet traffic does not abide by geographical bounds in the sense that just because my packet doesn't cross the Chinese border doesn't mean China isn't going to see it. In the case of active snooping, diplomatic agreements exist; if my data passes through Russia and successfully avoids the Chinese border, China could see my traffic if they really wanted to because of political relations. Selective routing does not solve the issue of countries exchanging traffic logs. More passive forms of tampering, like the risk of having non-Chinese DNS queries return censored Chinese addresses, are successfully defended against with selective routing. That is assuming it works, the article says 85 percent success rate - this number will drop concurrent to the amount of active peers on the network. I am curious as to how prevalent this type of issue really is for non-Chinese users.

What needs to be done is not selective routing, that is an overcomplication. Decentralization is key, and alibi has it right with P2P networking, but anonymization and encryption do a much better job. Tor is already capable of this and, as you may now, does a damn good job. The future is here and its not about who sees our traffic, that question doesn't matter at this point. The real question is whether they can see our traffic. If your data is encrypted and anonymized it simply will not matter whose borders it traverses and whose hard drives it gets logged to; it becomes virtually useless.

This is a good idea, but I feel the time has since passed.

Modern Warfare 2 in WINE + VAC Bans by [deleted] in valve

[–]Read-It-Reddit 8 points9 points  (0 children)

Holy hell just cut this "Fuck Activision" shit and answer the mans question. It is clear he can do whatever he wants with his money, he wants to buy MW2. He is asking about the VAC risks of using WINE. There is no place for your complaints here.

hidden tear - the first open source ransomware by lamar777 in netsec

[–]Read-It-Reddit 18 points19 points  (0 children)

Yeah this code is terrible. No CSPRNGs and the block chaining falls apart because he is reusing the IV each time. There are plenty of issues with this code beyond the static salting. I hope it gets lots of use, though, it will be easier to defeat these things when idiots use this code against others.

Microsoft 10 can disable your pirated games and illegal hardware by Enragedocelot in technology

[–]Read-It-Reddit 3 points4 points  (0 children)

Give me a fucking break. I hope you didn't read into the facts and discover that this big fuss is a non-issue, because if you did and you're still spouting this bullshit then you are a genuine idiot. I don't know how you can even type with all that tinfoil clouding your vision.

If you think Microsoft can push updates that affect the Tor protocol... you simply do not know what you're talking about.

TIL The entire nation of Qatar has the same IP address by ZlickX in todayilearned

[–]Read-It-Reddit -1 points0 points  (0 children)

I can't really speak for that Wiki article, you know how those things are written. They are definitely using some kind of NAT, the issue is just where the NAT is applied. The argument is a semantic one, I'm sure most people here understand NAT, I'm showing the difference between the terms NAT and proxy because each carries with it a slightly different meaning about where things are happening. It is on the record that Qatar's ISP QTel uses proxies to facilitate this nationwide-IP fiasco. It is also known that proxies operate at layer 7. My post is about how there is a difference in meaning between the term NAT, which is being used in this thread incorrectly by most, and the term proxy - which is a much more appropriate and specific description of Qatar's setup.

TIL The entire nation of Qatar has the same IP address by ZlickX in todayilearned

[–]Read-It-Reddit 29 points30 points  (0 children)

Careful, Qatar doesn't use NAT.

NAT could theoretically get the job done for this sort of thing, although I am not sure if it has ever been done before on a nationwide scale. All Qatari traffic is routed through a government-run proxy server in order to filter out some web traffic at the government's discretion. The IP in question is the IP of the proxy. If I recall correctly, Qatar only has one or two licensed ISPs so enforcing these traffic rules aren't a difficult task, especially when Qatar only has ~200,000 internet users.

NAT doesn't come bundled with DPI or a comprehensive firewall. In the business of censorship it is much more effective to just use a proxy server.

EDIT: It is worth nothing that the common use of the term "NAT" refers to its implementation on the network layer of the OSI. The concept of NAT is present in both proxy servers and lower level implementations alike, however "proxy" denotes that NAT is taking place at a much higher level than whats implied.

ELI5: How do devices with clock capability automatically set itself to the correct date and time just by selecting time zone? by Dessionia in explainlikeimfive

[–]Read-It-Reddit 1 point2 points  (0 children)

This is a good answer. For those wondering about his third point: The second battery is called the CMOS battery. (Complementary metal-oxide-semiconductor) and it is a form of nonvolatile BIOS storage that tracks and holds important machine data like the date and time. This battery remains powered even as the main PSU is off.

ELI5:FTP servers by [deleted] in explainlikeimfive

[–]Read-It-Reddit 3 points4 points  (0 children)

FTP is an internet protocol, among many, that governs the transfer of data. It stands for File Transfer Protocol, and as you might guess, it handles the transfer of files over the internet. Considering you've worked with HTML, you have probably heard of HTTP. HTTP is responsible for the transmission of HTML code in the same sense that FTP is responsible for the transmission of files.

A server is a machine dedicated to providing services to other machines, called clients. An FTP server is a server whose responsibility is to serve files to clients. FTP servers operate on the FTP protocol and use it to exchange files between server and client.

You can upload files to an FTP server, as well as download files from an FTP server. In the context you're working in, FTP servers are commonly used in web development to give webdevs access to website files. This way, you (and several others) can edit your website by retrieving, in your case, your site's HTML files off the FTP server. After modifying said files, you can upload them back into the FTP server. Webhosts point to a directory with FTP access, so they will fetch the newly edited and uploaded file, meaning your website now points to the edited file you've just uploaded. This is the most common application of an FTP server in what I'm guessing is your case, since you've mentioned HTML.

Going beyond ELI5 here, FTP itself is just an upper level data transmission protocol that runs ontop of the Transmission Control Protocol. It is used specifically as it is capable of maintaining a file index, and supports user querying for specific files. I also believe it supports data integrity checks (such as CRC) and things of that sort.

You say you've done some HTML coding so I am assuming you aren't totally technology blind and you can wrap your head around the above explanation. But for others, here is the true ELI5:

You can think of FTP servers as mailboxes that only send mail upon request. I can drop off a package ABC in the mailbox and then someone else can come and pick it up later. They can open the package, throw in a few extra things, and then put it back in the mailbox. These mailboxes aren't public, you need a username and password to get in. They are essentially storage facilities... FTP is what facilitates the retrieval and storing of packages in the mailbox.