Natanael

joined 1 year ago
[–] [email protected] 2 points 9 months ago* (last edited 9 months ago) (2 children)

A MAC is symmetric and can thus only be verified by you or somebody who you trust to not misuse or leak the key. Regular digital signatures is what's needed here

You can still use such a signing circuit but treat it as an attestation by the camera's owner, not as independent proof of authenticity.

[–] [email protected] 24 points 9 months ago (19 children)

It helps journalists, etc, when files have digital signatures verifying who is attesting to it. If the WH has their own published public key for signing published media and more then it's easy to verify if you have originals or not.

[–] [email protected] 3 points 9 months ago (2 children)

Bitlocker supports the same usecase, but everybody wants that automatic boot feature so...

It also lets you store a secondary key on a server and require the computer to be on trusted networks to be able to retrieve it to boot, but I've never ever heard of anybody using that

[–] [email protected] 1 points 9 months ago

They're heavily involved with the development of the spec and guidance to OEMs on how to implement it

[–] [email protected] 19 points 9 months ago (1 children)

Bitlocker's threat model is physical access, though. And it's 50% of TPM's threat model too.

[–] [email protected] 24 points 9 months ago

LLM is literally a machine made to give you more of the same

[–] [email protected] 2 points 9 months ago

Challenges-reponse protocols are what's needed

[–] [email protected] 1 points 9 months ago (1 children)

His entire argument is literally debunked by Veritaseum's other video about game theory and cooperation. Nobody will be nice to a corporation where everybody knows the board members always will defect against you.

[–] [email protected] 6 points 9 months ago (1 children)

All the algorithms on bluesky are optional, there's both official feeds and a lot of 3rd party feeds (and they don't run on view counts!), so there's no trivial way to game the algorithms to reach the userbase

[–] [email protected] 23 points 9 months ago

Managers from unaffected departments who are glad they have less internal competition. And that's pretty much it.

[–] [email protected] 2 points 9 months ago

Warehouse management?

[–] [email protected] 9 points 9 months ago

All of those qualifications require that you can handle a cascade of requests and manage tables

view more: ‹ prev next ›