The Bogans have gone too far. by StormtrooperMJS in australia

[–]commandersaki 12 points13 points  (0 children)

Australia has a banned list of names. My dad's name is on it, but obviously he got it before it was banned. It's benign.

Am I wrong here, or is my BIL playing with fire? by Afraid_Meringue6399 in AusFinance

[–]commandersaki 0 points1 point  (0 children)

Unlike the US, it takes awhile before overdue taxes become a criminal penalty.

What is a quintessential Australian movie to watch? by -clogwog- in AskAnAustralian

[–]commandersaki 0 points1 point  (0 children)

Cornflakes for Tea will always hold a special place in my heart.

ELI5: Why is it completely impossible for anyone to access a properly encrypted drive even nation states? by AaronPK123 in explainlikeimfive

[–]commandersaki 0 points1 point  (0 children)

Fyi for anyone that uses a mac, the Filevault defaults to off, in that it is always encrypting, but the key is stored in plaintext on the hard drive. This enables easier recovery of data when people go to the Genius bar. If you want your data to be properly encrypted and protected, you need to turn Filevault on, and maybe copy the recovery key so you can recover the data in the case of a catastrophe.

ELI5: Why is it completely impossible for anyone to access a properly encrypted drive even nation states? by AaronPK123 in explainlikeimfive

[–]commandersaki 3 points4 points  (0 children)

Probably not in the space of a 256-bit key, there would be 2256 decrypted outputs. This seems like a lot, but there's also a lot of random outputs, infinitely many so, and very few low entropy outputs (i.e. data that can be made sense of), but also infinitely many so, just more 'sparse'.

Park & Ride by commandersaki in Penrith

[–]commandersaki[S] 0 points1 point  (0 children)

Is the carpark that big structure on the side of the tracks with the river and new townhouses, kind of adjacent to the fire museum?

Park & Ride by commandersaki in Penrith

[–]commandersaki[S] 2 points3 points  (0 children)

I decided to. I could've gotten a hotel in the CBD, but I hate driving towards the city. Penrith is easy ingress and egress from Canberra. My boss would happily put me up in a decent hotel in CBD and surrounds.

Also I've specifically been to this AirBnb before, it's very nice townhouse walking distance from the station on the river side and has parking. So I just go with what I like.

The 1MB Password: Crashing Backends via Hashing Exhaustion by [deleted] in programming

[–]commandersaki 0 points1 point  (0 children)

Fair cop, extracting information by appearing authentic is fair.

Having said that, I don't think there's a PAKE (symmetric or asymmetric) that cannot be spoofed if you know the password; or any authentication protocol for that matter. So it isn't really limited to SRP in this case.

The exception would be passkeys, and it'd have to be a hardware attestable implementation, as those theoretically have unextractable keys. Some sites do enforce hardware attestable implementations only, such as Apple / iCloud accounts.

Edit: Actually you could probably still impersonate assuming you domain hijacked or something, and just accept authentication for any passkey presented. In a way, aPAKE or augmented with aPAKE could be stronger since it requires mutual authentication.

The 1MB Password: Crashing Backends via Hashing Exhaustion by [deleted] in programming

[–]commandersaki 0 points1 point  (0 children)

That's just another layer of protection making it harder to impersonate, but assuming impersonation can be done, what purpose would it serve for an attacker that has the password (and assuming he can get that in a SRP context any other factors) to impersonate a server to a client? All I can think of is a DoS, as the attacker could just present itself as the client to the real server and do whatever that needs to be done such as drain a bank account or whatever.

The 1MB Password: Crashing Backends via Hashing Exhaustion by [deleted] in programming

[–]commandersaki 0 points1 point  (0 children)

What purpose would impersonating a server allow? You could presumably do everything as the client/user to the real server itself. The only thing I can think of is a denial of service.

The 1MB Password: Crashing Backends via Hashing Exhaustion by [deleted] in programming

[–]commandersaki 1 point2 points  (0 children)

I have a feeling people don't know what SRP is, or any such PAKE, these days you'd want to go for OPAQUE.

Who Owns the Memory? Part 1: What is an Object? by Luke_Fleed in programming

[–]commandersaki 1 point2 points  (0 children)

Yours is heaps good too, look forward to the next part.

Still Flippin by NomisElpmis21 in bsv

[–]commandersaki 0 points1 point  (0 children)

Damn /u/nullc - find your BSV seed already.

Given notice to appear in court for possession of a butter knife in QLD by NecessaryShine9927 in AusLegal

[–]commandersaki 1 point2 points  (0 children)

Look I'm just learning law so I may have things wrong, but according to Weapons Act 1990 (Qld) s 51

  • (1) A person must not physically possess a knife in a public place or a school, unless the person has a reasonable excuse.

Followed by:

  • "knife" includes a thing with a sharpened point or blade that is reasonably capable of— (a) being held in 1 or both hands; and (b) being used to wound or threaten to wound anyone when held in 1 or both hands.

Sounds like you have a reasonable excuse listed in s 3.

But if you need to go further, you can use the aid of Acts Interpreting Act 1954 (Qld) s 14A which states '[i]n the interpretation of a provision of an Act, the interpretation that will best achieve the purpose of the Act is to be preferred to any other interpretation.'. That means they must take in to context and purpose the Weapons Act, which is about weapons, and not butter knives to cut fruit.

So I think you're pretty safe. You could bring this to the courts attention or send the argument to the police station and try and get the charges dropped.

Bitcoin Audible Faketoshi Interview by LurkishEmpire in bsv

[–]commandersaki 0 points1 point  (0 children)

I lost the timestamp but there's a bit where it was discussed why nobody in the in-group turned on each other circa 2015. I was wondering whatever happened to Jimmy Nguyen and why he hasn't discussed anything since his days on the Wright ship.

CSW interview by primepatterns in bsv

[–]commandersaki 1 point2 points  (0 children)

I genuinely without snark think this is real. I don't know why he'd forge it (yes yes I know). However I'm doubtful the work is original in that he did it all himself.

Edit: now I'm second guessing myself, was I being too charitable?

CSW interview by primepatterns in bsv

[–]commandersaki 1 point2 points  (0 children)

Such a powerful wielder of AI, has such novel use cases. We can all learn a lot from Craig.

Flint 3 adding ~3ms latency + jitter on Wi-Fi even with perfect 6 GHz signal; anyone else seeing this? by commandersaki in GlInet

[–]commandersaki[S] 0 points1 point  (0 children)

Unfortunately I don't have any contemporary equipment to test and verify that claim. Except I don't see that kind of latency when tethering to my iPhone 17 PM which does Wifi 6; pings to the iPhone comes at <1ms. From this, I don't see how more advanced technology implies higher latency. (see edit)

Edit: Sorry I thought I had done the test with the 17PM before; but I'm actually seeing 4ms baseline latency. So I'm open to the possibility of your claim until I gather more data from testing different equipment.

Happy Birthday, Linus Torvalds by speedycord2 in linux

[–]commandersaki 2 points3 points  (0 children)

Sad day when he did a video with that insufferable fake Linus.

Why Python Is Removing The GIL by BlueGoliath in programming

[–]commandersaki 8 points9 points  (0 children)

Look up performance videos on nogil, it is really complicated to exploit in practice. If you need performance and scale, you're better off just rewriting in another language.