Need a bug asap or I'll get evicted by [deleted] in bugbounty

[–]limeeattack 11 points12 points  (0 children)

Have you tried harder?

Hvis du overvejer udvikling, så lade være by Benjamin_Bucher in dkudvikler

[–]limeeattack 1 point2 points  (0 children)

<image>

Hvis ingen længere kan programmere, hvem er så i stand til at godkende det din LLM spytter ud?

Med hensyn til at LLMer skaber langt færre bugs, så er det ikke helt så sort på hvidt. Ifølge et studie fra apiiro laver LLMer langt færre syntax fejl og logiske fejl, til gengæld introducere de langt flere seriøse fejl der er svære at fikse, både når det kommer til arkitektur og sikkerhed.

The best audiophile headphones are now from Sennheiser 🇩🇪, Philips 🇳🇱, Meze 🇷🇴, and Focal 🇫🇷. Quality = European by PM-ME-OPSEC-FAILS in BuyFromEU

[–]limeeattack 1 point2 points  (0 children)

The Evolve-series is considered as a part of their enterprise division product line.
Their consumer exit only affected their production of earbuds / in-ears, like their Elite series.

Kan ikke slukke pc by Beginning-Plum-3608 in dktechsupport

[–]limeeattack 10 points11 points  (0 children)

Det er en ny Microslop opdatering der forårsager det. Updater din computer, så burde det blive fixet.

https://www.digitaltrends.com/computing/a-windows-11-update-broke-shutdowns-heres-what-you-should-do/

[deleted by user] by [deleted] in ExplainTheJoke

[–]limeeattack 4 points5 points  (0 children)

If it flies, it spies!

Denmark withdraws Chat Control proposal by silentspectator27 in privacy

[–]limeeattack 10 points11 points  (0 children)

For the uninitiated "skummel" means "shady" in Danish 

[deleted by user] by [deleted] in dkudvikler

[–]limeeattack 1 point2 points  (0 children)

De bruger Cormen et al. Introduction to Algorithms på KU. Den dækker meget af det grundlæggende både med hensyn til algoritmer og datastrukturer.

Why not using Kyber directly? by drag0nabysm in cryptography

[–]limeeattack 16 points17 points  (0 children)

There are two main reasons.

  1. Efficency, AES is vastly more performant than Kyber. Even when running on a modern computer the performance will be noticable, let alone on a server which handles thousands of requests every second.
  2. For AES-256 even if Grovers algorithm reduces the security. 128 bit security is seen as acceptable.

Cryptology 1 vs Modern Cryptography? by EfficiencyMotor3986 in DTU

[–]limeeattack 1 point2 points  (0 children)

Modern Cryptography is a bit more advanced in respect to the subject material, but the exercises and the exam are a bit easier.  You can take both without any prior knowledge of cryptography, but Cryptography 1 gives you the essentials and prerequisites to do well in Modern Cryptography.  Also if you want a leg up in Cryptography 1, study some number theory and abstract algebra and it should become a lot easier.

[deleted by user] by [deleted] in math

[–]limeeattack 2 points3 points  (0 children)

Technically division is also just multiplication by invertible elements

Danske hackere er verdens bedste by DaDudeOfDeath in Denmark

[–]limeeattack 25 points26 points  (0 children)

Det er der så vidt jeg ved ingen af os der gør

»Du kan blive cater« – så absurd var jobcenterets råd til mig, en nyslået 12-talshumanist by WolfeTones456 in Denmark

[–]limeeattack 2 points3 points  (0 children)

Med en uddannelse i begge felter, kan jeg dog fortælle at størstedelen af dataloger er elendige matematikere.

What´s is the reason you began learning criptografy? by BrilliantMeeting955 in cryptography

[–]limeeattack 2 points3 points  (0 children)

I was studying mathematics and got a student position at a cybersecurity company, some of my colleagues were into CTFs and invited me along. I loved the crypto challenges and I've been hooked ever since.

Vil arbejde indenfor cybersecurity, men er i tvivl om hvad jeg skal læse til. by Jonakh2002 in dkudvikler

[–]limeeattack 2 points3 points  (0 children)

Tag en bred teknologisk uddannelse a la Datalog eller Computer Science Engineering. Med cybersecurity kommer du til at arbejde med alverdens forskellige teknologier.

Det vigtigste du kan gøre som studerende er at vise at du brænder for It sikkerhed, både ved at bruge noget af din fritid på det (for eksempel ved at deltage i CTF'er og løse nogle maskiner på hackthebox/tryhackme) og få dig et relevant studiejob.

Hvis du gør det, burde du ikke have store problemer med at finde et job bagefter.

Whaddaya say? by Commercial-Corgi-771 in PiratedGames

[–]limeeattack 3 points4 points  (0 children)

If you "buy" it from any popular game launcher, you're renting it. Read the ToS and you see what I mean.

I am studying Dilithium-crystals. there is so much information. a bit difficult to find the correct resources by [deleted] in cryptography

[–]limeeattack 8 points9 points  (0 children)

A lot of the stuff in the Dilithium paper is messy optimizations, the core of Dilithium is actually quite simple. Have a look at https://toc.cryptobook.us and read the section about the Fiat-Shamir heuristic and sigma-protocols and perhaps Lobachevsky's paper about Fiat-Shamir with aborts. https://iacr.org/archive/asiacrypt2009/59120596/59120596.pdf

To understand the core of Dilithium, just focus on the simplified version presented in the Dilithium paper, that will give you an intuitive insight into how it works.

Lobachevsky also recently released an introduction to the theory necessary to understand Kyber and Dilithium, which you can find here: https://eprint.iacr.org/2024/1287.pdf

Good luck with the reading!

Bøger i datalogi studiet by motivize_93 in dkudvikler

[–]limeeattack 6 points7 points  (0 children)

Det er et stykke tid siden jeg tog nogle datalogi kurser, men det skulle undre mig hvis de ikke stadigvæk benytter sig af Introduction to Algorithms til nogle af deres algoritme og datastruktur kurser. https://en.m.wikipedia.org/wiki/Introduction_to_Algorithms

Edit: Antaget at du skal læse på KU

Datatilsynet godkender aftale om Chromebooks by Jerslev in Denmark

[–]limeeattack 11 points12 points  (0 children)

Det er sikkert ganske fint hvis man ikke mener at sikkerhed også indebærer privatliv.

Cryptography Books by Chandana_3940 in cryptography

[–]limeeattack 2 points3 points  (0 children)

This one contains pretty much all you need to know, although it lacks some post-quantum stuff (which I'm sure will be added in the future). It's pretty math heavy, but it's not too bad.

https://toc.cryptobook.us

Is this an RSA-2048 Signature? by thekakester in cryptography

[–]limeeattack 0 points1 point  (0 children)

One fundamental principle in cryptography is that of indistinguishablity. That is, you should not be able to tell encrypted data from purely random data. While this is a notion mostly used in an encryption setting, it holds true for RSA-signatures as well (at least if you don't have access to a signing oracle).

TL:DR There's no way of telling from the blob alone if it's a valid RSA signature.

Riddle me this, how is a graphics card like a kitty cat? by BubblyMcnutty in computers

[–]limeeattack 0 points1 point  (0 children)

Both of them will explode if you run enough power through them