this post was submitted on 02 Sep 2023
204 points (96.4% liked)

Technology

58092 readers
3939 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] Harrison@ttrpg.network 2 points 1 year ago (1 children)

The more sophisticated the system, the more sophisticated your method must be to break it. Eventually the means to break it will grow out of the reach of guerilla movements

[โ€“] kava@lemmy.world 4 points 1 year ago

i'm not sure. maybe you're right but there are a lot of dedicated hackers out there who do some amazing things and bypass very complex security systems.

the person creating a system needs to be correct 100% of the time - the person trying to break it just needs to be correct once. there's an infinite multitude of things that can go wrong with something and any one of those is an opening to somebody perceptive enough.

and remember advance of technology goes both ways. military gets access to advanced AI, so do their enemies. it's a game of cat and mouse we've been playing for a long time