Skip Navigation

Posts
5
Comments
801
Joined
2 yr. ago

  • Yeah, I've learnt over the years that having non-computer based creative hobbies is really important. I did a bit of leather working for a bit - tools are cheap on AliExpress and it doesn't take up a ton of space unless you go really deep. Spend a few hours on a weekend in the garage making a thing that is tangible and I can hold and doesn't require maintenance

  • Oh don't get me wrong, 99% of the time I love my career and 15 years in I still get a kick out of crafting code to make the stupid little machines do what I want.

    The other 1% of the time - a couple of days a year - I get home at the end of the day with a profound sense that these machines are driving me slowly mad

  • Ikr, surely "don't be excessively cruel to the piece-workers who make the agricultural industry price competitive" would be a better strategy? Is this going to end up like brexit where next minute you've got a load of farmers wanting a bailout cos it turns out noone wants to be paid less than minimum wage to get heat stroke picking fruit or whatever?

  • Things made out of wood don't suddenly stop working cos you looked away for 15 seconds and Wood v2.1.4 is incompatible with Nails v4.0, but if you upgrade Nails you also have to upgrade Paint to v2.2 and they completely changed their API because the old API wasn't sufficiently cool anymore

  • At some point every professional computer person - programmer, sysadmin, whatever - will seriously consider piling all their computers into a big pile, lighting them on fire, and moving to the country to start a new life making things with their hands

  • The actual math is way beyond me, but the algorithm is "one way" - it exploits the fact that given two prime numbers (ie, the private key) it is trivial to multiply them together, but if you only know the result (ie, the public key) it is computationally very expensive to determine the original prime factors. If you pick big enough numbers, it becomes effectively impossible to undo the multiplication

  • Ok, semantics - for RSA you generate a private key, then derive the public key from that private key, and you could publicly post your private key if you wanted to. "Public" and "private" are just names.

  • In RSA, the private key is a pair of big semi-primes, and the public key is derived from those numbers. I think you are confusing DHKE and RSA with your other points, the private key is never transmitted over the network. For TLS you typically use an asymmetric crypto system to validate identities and encrypt the key exchange to prevent person-in-the-middle, but the key that is agreed using that process is a symmetric key for AES or similar, but that is specific to TLS.

    Also, there are other asymmetric systems that don't use primes at all - eliptic curve crypto is based on completely different math

  • A big "It Depends" on that - plenty of applications of asymmetric crypto where you just hard-code the servers public key into the client and call it a day, and GPG has its own PKI scheme that is just kinda weird.

    You also don't have to use Diffie-Hellman - early versions of SSL just sent the ephemeral key (the symmetric key used for the actual AES session) directly. This works, but using DH also gives you "forward secrecy" - even if a malicious third party has captured the entire encrypted session, then later steals (or factors) your private key they still won't be able to read the encrypted traffic because they can't recover the ephemeral key because it wasn't sent over the wire in the first place

  • You've missed a key detail in how asymmetric encryption works:

    • For asymmetric encryption algorithms, you essentially have two keys - a "private" key, and a "public" key
    • If you know the private key it is trivial to calculate the public key, but the reverse isn't true - just given the public key, it is essentially impossible to calculate the private key in a reasonable amount of time
    • If you encrypt something with the public key you must use the private key to decrypt it, and if you encrypt with the private key you can only use the public key for decryption
    • This means that my server can advertise a public key, and you can use that to encrypt the traffic so that only the server that knows the private key can decrypt it
  • Didn't mean to put you off if it's something you are interested in, just be aware with what you are dealing with going into it.

    Small desktop CNCs are relatively affordable, but only cut in 2 dimensions. Laser cutters fill a similar niche, are a bit more limited in the types of materials they can cut and how thick the material can be, are a bit more forgiving than a CNC (no risk of breaking milling bits if you screw up), but have safety issues to be aware of. I'm not aware of any hobby-grade muli-axis CNC machines, but there might be ones out there

  • Heavy metal poisoning will kill you slowly, as opposed to the rather more immediate sensation of catching fire while getting severe frostbite

  • For minis and other things where you want lots of small details you want a resin/SLA printer.

    • Keep in mind that as well as the printer itself, you also need equipment to wash and cure the resin after it comes out of the printer
    • Resin is extremely toxic, accumulates in the body (ie, lots of small exposures over time is just as bad as one big exposure), and you can develop immune sensitivities to it where your body freaks out with even small amounts leading blisters, burns and breathing difficulties. Do not screw around with resin. Use proper PPE. Dispose of waste resin properly
  • Natural (unenriched) uranium isn't especially radioactive and while there is plenty of exciting chemistry that could happen, none of it would be quite as immediately exciting as what would happen if you tried to freeze oxygen solid enough to make a dildo

  • The biggest step forward since the invention of teledildonics

  • Like don't leave it out at room temperature for hours - bacteria die above 60C and go dormant below 4C, so you need to minimise the amount of time the food spends in the "danger zone"

  • Infrastructure of Code?

  • Idk, if you want to test people on how they understand formulae and order of operations without letting them just punch it into a calculator. The actual math isn't hard, but if you don't get substituting values into an equation then it's not trivial

  • Don't know about US law, but where I live we have a "Preventative Detention Order" - the threshold for it is very high, but it essentially works as a sentence of "until rehabilitated", you are incarcerated until the court decides that you are no longer a threat to the community, even in cases where a life without parole sentence wouldn't be possible. In a world where I am supreme ruler, it'd automatically apply in cases where someone who has a conviction for a violent crime commits another violent crime.

    Also, how the hell does an 8 year old get a gun? Surely whoever failed to secure it - or even worse gave it to a minor - would be looking at an accessory change?

  • If I die before I wake / At least in heaven I can skate / Cos right now on earth I can't do shit / Without the man fucking with it