• 6 Posts
  • 25 Comments
Joined 1 year ago
cake
Cake day: July 12th, 2023

help-circle
  • Yes! There is this Buddhist saying, supposedly some 2,500 years back, “Even if a whole mountain were made of gold, not double that would be enough to satisfy one person.”

    You can trace unsatisfied greed in American gazillionaires all the way back to Rockefeller. Before that, you can trace it to Kings, Queens, Emperors, Conquerors. Only external circumstances, societal structures/cultures/etc, keep the greed in check. As soon as we were out of subsistence living, we started collecting, often times just for the sake of collections, sometimes other people’s great misery be damned.























    1. Yes, if it disconnected and is unable to sync, you can still access the vault.
    2. If you change the master password elsewhere, when your app is able to sync, it will log out automatically.

    Ideally, since you want to write your master password down to keep it safe somewhere (because you can forget), you write the new password down before you change the password.

    cc: @WtfEvenIsExistence@reddthat.com




  • Summary

    • Scientists at the Department of Energy’s Pacific Northwest National Laboratory have developed a new way to detect denial-of-service attacks.
    • The new technique is more accurate than current methods, correctly identifying 99% of attacks in testing.
    • The technique works by tracking the evolution of entropy, a measure of disorder in a system.
    • During a denial-of-service attack, two measures of entropy go in opposite directions. At the target address, many more clicks than usual are going to one place, a state of low entropy. But the sources of those clicks, whether people, zombies or bots, originate in many different places—high entropy. The mismatch could signify an attack.
    • The new technique is automated and doesn’t require close oversight by a human to distinguish between legitimate traffic and an attack.
    • The researchers say that their program is “lightweight”—it doesn’t need much computing power or network resources to do its job.
    • The PNNL team is now looking at how the buildout of 5G networking and the booming internet of things landscape will have an impact on denial-of-service attacks.