134
submitted 8 months ago by throws_lemy@lemmy.nz to c/technology@beehaw.org
top 27 comments
sorted by: hot top controversial new old
[-] Appoxo@lemmy.dbzer0.com 59 points 8 months ago

This office needs a parking garage.
Why the fuck are americans always building 2 dimensional except for their buildings???

[-] Radiant_sir_radiant@beehaw.org 36 points 8 months ago

Yeah, right? Looks like you need a car to get from your parked car to the entrance.

[-] Appoxo@lemmy.dbzer0.com 7 points 8 months ago* (last edited 8 months ago)

Even our local grocery store that is probably ¼ of the size of a typical Walmart (Edeka center in Germany) has a 2 story parking deck and another underground parking garage under the literal store.

Edit: To answer to your comment: This has theme park level parking. They should install a round trip subway under or surface tram at the place

[-] CanadaPlus@lemmy.sdf.org 4 points 8 months ago* (last edited 8 months ago)

I wouldn't be surprised if there's literally a parking lot shuttle.

[-] sunbeam60@lemmy.one 9 points 8 months ago

Because they have the space. It’s hard for us Europeans to understand. In places where they don’t, they certainly go below ground - look at Microsoft’s parking garage in Redmond.

[-] master5o1@lemmy.nz 19 points 8 months ago

It's an abundant resource curse; land is the resource that is wasted.

https://en.wikipedia.org/wiki/Resource_curse

[-] CanadaPlus@lemmy.sdf.org 2 points 8 months ago

So the question, then, is why build up at all. I'm guessing since this is the NSA lowering surface area for security was a factor.

[-] pimento64@sopuli.xyz 1 points 8 months ago

My office complex is nearly 1 km from one end to the other and a whopping three stories tall, and the third floor is much smaller than the bottom two. If you count the parking lots, it's almost twice as big.

[-] bedrooms@kbin.social 39 points 8 months ago

Daniel Bernstein at the University of Illinois Chicago says that the US National Institute of Standards and Technology (NIST) is deliberately obscuring the level of involvement the US National Security Agency (NSA) has in developing new encryption standards for “post-quantum cryptography” (PQC).

This sentence is basically all.

[-] Radiant_sir_radiant@beehaw.org 34 points 8 months ago

TL;DR: NSA accused of doing that thing that it's been doing for decades, again.

[-] solanaceous@beehaw.org 20 points 8 months ago

So I wrote a long-ass rundown of this but it won't post for some reason (too long)? So TLDR: this is a 17,600-word nothingburger.

DJB is a brilliant, thorough and accomplished cryptographer. He has also spent the past 5 years burning his reputation to the ground, largely by exhaustively arguing for positions that correlate more with his ego than with the truth. Not just this position. It's been a whole thing.

DJB's accusation, that NSA is manipulating this process to promote a weaker outcome, is plausible. They might have! It's a worrisome possibility! The community must be on guard against it! But his argument that it actually happened is rambling, nitpicky and dishonest, and as far as I can tell the other experts in the community do not agree with it.

So yes, take NIST's recommendation for Kyber with a grain of salt. Use Kyber768 + X448 or whatever instead of just Kyber512. But also take DJB's accusations with a grain of salt.

[-] Dark_Arc@social.packetloss.gg 1 points 8 months ago

Honestly at this point... I'd be surprised if they are seriously undermining encryption. NIST and NSA need encryption to work to protect the government itself ... they're to my knowledge not staffed by idiots, and a lot has changed since the 90s and early 2000s. Encryption is a core portion of security in 2023.

[-] ram 13 points 8 months ago
[-] bitcrafter@lemmy.sdf.org 10 points 8 months ago

I was curious to hear what argument they were making but the article is behind a paywall. Could someone with access to it summarize for me?

I am curious because this seems a bit implausible to me given that the protocol selection process involves an open competition.

[-] throws_lemy@lemmy.nz 0 points 8 months ago

Can you try clearing your browser cache and cookies first? It's fine here

another way, archive.org could help you

[-] abhibeckert@beehaw.org 1 points 8 months ago* (last edited 8 months ago)

Paywalled for me too (or rather, it requires "registration" which is basically the same thing - I'm not opposed to paying for a good article but I am opposed to giving them my personal details).

[-] sunbeam60@lemmy.one 10 points 8 months ago
[-] Penguincoder@beehaw.org 7 points 8 months ago
[-] CanadaPlus@lemmy.sdf.org 5 points 8 months ago

Really. I hope everyone saw this coming. The process has also been weirdly slow. I'm not sure why everyone is waiting up for NIST.

Thankfully, PQ HTTPS is just around the corner now, and I imagine other TLS-based protocols won't be far behind.

[-] furrowsofar@beehaw.org 4 points 8 months ago

Quantum computers are not even close yet. Maybe some day though.

[-] thewitchofcalamari 41 points 8 months ago

but quantum resistant encryption are important even now despite that because of store now, decrypt later of long-term sensitive information

[-] furrowsofar@beehaw.org 8 points 8 months ago

That is the problem with encryption. It only provides security over a period of time. Always better to keep data on your own hardware in your own place.

Quantum is also more of an issues for public key crypto. Symmetric key crypto is different.

[-] snaptastic@beehaw.org 7 points 8 months ago

Could you explain more on that last point? Sounds really interesting.

[-] Godort@lemm.ee 12 points 8 months ago

Asymmetric key exchange works by utilising a complex math equation involving massive exponents that is easy to run to get an answer, but very hard to use that answer to get the numbers you started with.

With traditional computers, you essentially need to try every combination of numbers through trial and error to get the starting values.

Quantum computers are almost purpose built for this kind of math and can solve those types of problems exponentially faster than traditional computers.

However, for a symmetric key, there isn't an exchange that can be attacked, both sides already know the key.

[-] xylem@beehaw.org 2 points 8 months ago

There is still a quantum attack against symmetric key crypto like AES, but it just reduces the effective key size by half. If you use long enough keys (256 bits) you're still fine.

[-] furrowsofar@beehaw.org 3 points 8 months ago

Others know a lot more about this then I do. The short answer is that some problems that are hard to solve now can be easily solved with quantum computers. Factorization of large integers is one of those things that is easily solved and public key crypto is based on that sort of problem. Hence the panic. Symmetric key crypto is not.

I think it comes down to just because quantum computers can solve some problems easily it does not mean they can solve all problems easily. Each situation needs to be looked at.

this post was submitted on 15 Oct 2023
134 points (100.0% liked)

Technology

37208 readers
121 users here now

Rumors, happenings, and innovations in the technology sphere. If it's technological news or discussion of technology, it probably belongs here.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS