Hacker News .hnnew | past | comments | ask | show | jobs | submit | dr_hooo's commentslogin

No true regarding the IDs, only PhD titles can be added. Not job descriptions. Source: academia person in Germany.

It seems Germans add their PhD titles even to their nicknames. :)

Sadly, another attempt will likely be made at some point. At least the regulation is quite explicit:

> This Regulation shall not prohibit, make impossible, weaken, circumvent or otherwise undermine cybersecurity measures, in particular encryption, including end-to-end encryption, implemented by the relevant information society services or by the users. This Regulation shall not create any obligation that would require a provider of hosting services or a provider of interpersonal communications services to decrypt data or create access to end-to-end encrypted data, or that would prevent providers from offering end-to-end encrypted services.


> The same thing happened when Internet arrived. "Don't believe anything you read on the Internet."

Isn't the saying "Don't believe *everything* you read on the Internet."? Which is quite different (and still holds today).


I was all for post-quantum crypto until I heard the news about SIKE being broken with a simple computer.

How will you make sure this does not happen to the algorithms you chose?


As all post-quantum crypto is relatively new there is still the risk of it being broken in the future. This is why we combine the new algorithms with classical ones in an hybrid approach so that the encryption stays at least as secure as it is now.


By mixing it up with classical encryption algorithms. The implementations don’t use pure post quantum cryptography, see SSH.


Learn some math.

SIKE was known to be breakable since at least 1997, specific breaking algorithms were developed in 2000, and these were implemented in Magma (a symbolic algebra suite from John Cannon, Sydney Uni, second generation after the original Cayley system of the mid 1980s).

It wasn't a choice that would have been put forward by people in the abstract algebra game - just something put forward as a 'candidate' by security researchers.

Something something Venn diagrams.


Little rude, he was just asking a question.

Learn some decency.


Learn some math, more specifically learn abstract algebra | read current papers in the field, befriend people active in the field that have taken over from Charles Leedham-Green, George Havas, et al is good practical advice to avoid using methods already known for decades to be weak.

It answers the question.

> Learn some decency.

Little rude, given the question asked was answered.


Question is whether they will stop tracking you, even if you pay.


From my understanding, there is a strong assumption backed by observations that matter and physics work the same way everywhere in our universe.


Could you provide some information on the Victoria Neuland thing?


[flagged]


Ukraine has had multiple elections since Euromaidan, and Zelensky was supposed to have been the pro-Russia candidate.


Microwaving steel isn't really a problem, as long as it is not just a very thin layer (can confirm)


A (regular) steel beverage can is pretty thin, and comes with sharp edges on the opener ring/tab? (I suppose the tab could be plastic - but they're not now)


Sure, but how would the average guy fare at the same task?


Is GPT 4 the "average AI"?


This doesn't seem to be a very hard problem to me. In the sense that you don't need to invent any new tech to store personal info. I also don't see a reason why these models will not run locally on our devices in the future.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: