ludbb | 9 years ago | on: Show HN: HamPanda – You Get Hams for Playing and Pandas for Winning
ludbb's comments
ludbb | 9 years ago | on: Faulty Reward Functions in the Wild
ludbb | 9 years ago | on: Git 2.11 has been released
The issue is a different one, I believe you're considering one specific situation while there are others to ponder. What would happen if someone copy & pasted part of the hash, or had some tool that always reduced that output to the first few digits, or other situations like these, how would you be able to tell that the user was actually after the oldest commit? It seems much easier to indicate there's a problem, a conflict, and let the user solve it.
ludbb | 9 years ago | on: Reimplement the Redis based on seastar
ludbb | 10 years ago | on: DNS Outage at DigitalOcean
ludbb | 10 years ago | on: DNS Outage at DigitalOcean
ludbb | 10 years ago | on: Is group chat making you sweat?
ludbb | 10 years ago | on: OpenSSL Security Advisory
The general clean up idea is mentioned all over, but selecting old versions of specific files is not.
ludbb | 10 years ago | on: OpenSSL Security Advisory
OpenSSL history for crypto/bn/asm/x86_64-mont5.pl can be seen at: https://github.com/openssl/openssl/commits/d73cc256c8e256c32...
LibreSSL is using an old version of that same file found at http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/.... LibreSSL is using a version (possibly with patches on top of it) that is at least before https://github.com/openssl/openssl/commit/cf6d55961cfaa00eb1..., which introduced the bug reported.
BoringSSL patched it here: https://boringssl.googlesource.com/boringssl/+/e701f16bd69b6...
So, why LibreSSL went with a 2+ year old version of that file?
ludbb | 10 years ago | on: EC2 Dedicated Hosts
ludbb | 10 years ago | on: Ethereum Alarm Clock
Guarantees - Will the call happen?
There are no guarantees that your function will be called. The design of this service is meant to provide the proper motivation for calls to be executed, but it is entirely possible that certain calls will be missed due to unforseen circumstances.
ludbb | 10 years ago | on: Running the Let's Encrypt Beta
Thanks about the warranty clarification, so it only protects you if the /CA/ does something bad to you? In that case wouldn't it possible to sue the entity for, possibly, an even larger sum?
ludbb | 10 years ago | on: Running the Let's Encrypt Beta
One thing I don't understand about the guarantees given by CAs is the one about the warranty, like the "$1,750,000 Warranty" from Comodo. How exactly can they provide that? Or is that some sort of MUST have if you want to partner with an insurance company?
ludbb | 10 years ago | on: Webwatch
ludbb | 10 years ago | on: DoJ to Apple: we can force you to decrypt
ludbb | 10 years ago | on: DoJ to Apple: we can force you to decrypt
ludbb | 10 years ago | on: DoJ to Apple: we can force you to decrypt
It's not fully specified, but since the PDF mentions "iteration count" then Apple is using some sort of KDF after you enter your PIN to make brute force attacks harder to perform. It also mentions the following delays:
Delays between passcode attempts
Attempts Delay Enforced
1-4 none
5 1 minute
6 5 minutes
7-8 15 minutes
9 1 hour
There's also an optional setting you can enable so that after 10 failed consecutive attempts the device's data is wiped.ludbb | 10 years ago | on: Firefox Developer Edition vs. Chrome
If you're developing something with React, Chrome will provide a better experience since React dev tools plugin is only available for Chrome. I'm not aware of some tool that is exclusive to Firefox, so I don't have a reason to favor it.
ludbb | 10 years ago | on: Swiss-Style Color Picker
Your reply starts by mentioning color palettes based on Swiss design, but is that the case here? It seems colors individually are not part of ITS, but how they are used (and therefore all colors can be used on it, as long as properties of this design philosophy are observed).
ludbb | 10 years ago | on: OAuth Has Ruined Everything
I think it's absolutely a good idea to use battle tested code, but you need at least working knowledge on what you're doing to apply it properly. Same thing applies for crypto in general: you generally don't implement it yourself, you generally use battle tested code, but you need to understand what you're doing. The idea that you can eliminate any of these steps and have something working properly is wishful thinking.