Hey,
On Tue, 15 Dec 2020 at 02:28, wrote:
> There are 3 kind of hashing algorithm
I'm sure there are a lot more. Like 'cryptographic' purposes are
ambiguous. Proving that content hasn't been changed requires hash to
be fast and HW friendly, using hash to protect password requires hash
to be
o/
Small of out topic
On 12/14/20 7:16 PM, Lawrence Wobker wrote:
A “perfect” balancing algorithm would be crypto grade hash generation
with a large output, and a true modulo operation to select which member
we use.
There are 3 kind of hashing algorithm
The first one is used to check the
Saku Ytti wrote:
On Mon, 14 Dec 2020 at 19:12, Miles Fidelman wrote:
As to chess... I've begun to think that the game to master is now Go...
capturing territory, not pieces, and instantaneous global state changes.
Now implies change, when, in your mind, this changed from Chess to Go?
Not
On Mon, 14 Dec 2020 at 16:58, Pascal Thubert (pthubert) via NANOG
wrote:
> The IPv6 flow label is 20 bits but hardware implementations do their
> balancing only on a subset of that, e.g. 12 or 16 bits.
Why? I don't think it's fundamentally true. Even if we imagine your
instruction set reading
On 12/14/20 19:44, Laszlo Hanyecz wrote:
This stuff is definitely the most visible type of scamming but this is
not any different from swindling people at a flea market. It isn't so
much hacking as just using internet to communicate with people and
then tricking them. I think this is a
So I’d argue that the pedantic answer is “you need only as many bits of entropy
as your largest fan out” — meaning that 10 bits would allow 1024-way ECMP. But
I don’t think that’s what you were actually after...
Most of the challenges I’ve seen are not around how many bits you end up with,
- On Dec 12, 2020, at 2:26 PM, Peter E. Fry p...@tailbone.net wrote:
Hi,
> Simple question: What's the purpose of obtaining illicit access to
> random devices on the Internet these days
Don't underestimate the curiosity if pimply faced youth these days.
Wargames is still relevant.
Thanks,
On 2020-12-14 16:48, Mark Tinka wrote:
On 12/14/20 18:38, David Bass wrote:
It becomes more clear when you think about the options out there, and
get a little creative. Now a days it’s definitely chess that’s being
played.
You're right, it really doesn't take much. Preying on humanity
Maybe the route dampening expired, we've got connectivity again.
On Mon, Dec 14, 2020 at 9:26 AM Jared Geiger wrote:
> I think Spectrum / Timewarner AS 7843 is dampening one of my routes
> 199.19.120.0/22. Can someone contact me to help diagnose the issue? We're
> not a customer traffic leaving
I think Spectrum / Timewarner AS 7843 is dampening one of my routes
199.19.120.0/22. Can someone contact me to help diagnose the issue? We're
not a customer traffic leaving Timewarner doesn't make it off the network
and I'm unable to trace into the timewarner network.
To TW
mtr --report
On Mon, 14 Dec 2020 at 19:12, Miles Fidelman wrote:
> As to chess... I've begun to think that the game to master is now Go...
> capturing territory, not pieces, and instantaneous global state changes.
Now implies change, when, in your mind, this changed from Chess to Go?
--
++ytti
On 12/14/20 19:08, Miles Fidelman wrote:
As to chess... I've begun to think that the game to master is now
Go... capturing territory, not pieces, and instantaneous global state
changes.
#TheQueensGambit :-).
Mark.
David Bass wrote:
It becomes more clear when you think about the options out there, and
get a little creative. Now a days it’s definitely chess that’s being
played.
And here I thought the purpose of hacking is (still) having fun - you
know... hacking.
As to chess... I've begun to think that
On 12/14/20 18:38, David Bass wrote:
It becomes more clear when you think about the options out there, and
get a little creative. Now a days it’s definitely chess that’s being
played.
You're right, it really doesn't take much. Preying on humanity can yield
great results.
One that has
It becomes more clear when you think about the options out there, and get a
little creative. Now a days it’s definitely chess that’s being played.
This Solarwinds thing is going to be extremely interesting.
On Mon, Dec 14, 2020 at 11:35 AM Mark Tinka wrote:
>
>
> On 12/14/20 18:23, Ryland
On 12/14/20 18:23, Ryland Kremeier wrote:
I would have to disagree. Considering the amount of people who have
bitcoin, and even less the amount of people who farm it, or have
farmed it before it became so difficult. It seems much more likely
that the wide-spread infiltrations of every-day
I would have to disagree. Considering the amount of people who have bitcoin,
and even less the amount of people who farm it, or have farmed it before it
became so difficult. It seems much more likely that the wide-spread
infiltrations of every-day systems is for information and DDoS over
Bitcoin.
There wasn't much purpose to 'hacking' for a long time. Even when
talking about DDoS stuff, it's still just temporary vandalism, it's only
an inconvenience, and it can be undone pretty quickly. The whole idea
of providing security has been turned into a wink-wink scam where people
On Mon, Dec 14, 2020 at 09:58:01AM -0500, Tom Beecher wrote:
> Questionable cloud / VPS / hosting companies are great for spammers and
> botnet C, but not so great for DDoS "ion cannons". You still need a large
> volume of geographically diverse endpoints for those to be effective.
To piggyback
The probable "purpose of obtaining illicit access to random devices on the
Internet these days” is to create botnets to attack more lucrative targets or
to employ them as gateway devices to provide access to local networks which may
contain targets of interest.
James R. Cutler
I think you’re coming at it the wrong way. It’s not going to be one, or a
couple of dudes behind a screen like in the movies. It’s ran autonomously for
as long as possible. Gathering information on easily accessible devices and the
like. Any information gathered is information that can be sold,
Questionable cloud / VPS / hosting companies are great for spammers and
botnet C, but not so great for DDoS "ion cannons". You still need a large
volume of geographically diverse endpoints for those to be effective.
On Mon, Dec 14, 2020 at 9:52 AM Peter E. Fry wrote:
>
> Simple question: What's
Dear all:
How many bits of entropy do we need for (ECMP) load balancing in the core?
This question has kept coming up regularly in many discussions and drafts at
the IETF.
The IPv6 flow label is 20 bits but hardware implementations do their balancing
only on a subset of that, e.g. 12 or 16
Simple question: What's the purpose of obtaining illicit access to
random devices on the Internet these days, considering that a large
majority of attacks are now launched from cheap, readily available and
poorly managed/overseen "cloud" services? Finding anything worthwhile
to steal on
24 matches
Mail list logo