• 0 Posts
  • 18 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle
rss






  • Two questions for you!

    1.) What is the most useful thing we in the Lemmy community can do to help you get that Oscar?

    2.) I have a secret Santa this year coming up in a month that I am a part of with some friends. Would you be interested in leaving a comment for a friend of mine in response to this that I can show them a month from now for the secret santa?

    “Hey Rome, this is Margot Robbie wishing you a merry Christmas and happy new year?”, or something like that?

    Thanks for being cool either way and good luck getting nominated this year!














  • His point, which seems pedantic, but isn’t, is to illustrate the specific attack vector.

    Breaking encryption would mean that the cryptographic process is something that an attacker can directly exploit. This is as close to impossible as it gets in that line of work.

    While you can compromise the effectiveness of encryption by subverting it using other attack vectors like man in the middle or phishing or the good old fashioned physical device access, these don’t break the algorithm used in a way that it makes it vulnerable to decrypting other data.

    None of those mean an algorithm used like say the ole Two fish encryption is “broken”.

    Blowfish Triple DES Twofish RC4 Etc. All are fine and not currently broken. All however cannot protect your data if some other attack vector companies you or your site’s security.