Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Programmer Humor
  3. I wonder if this was made by AI or a shit programmer

I wonder if this was made by AI or a shit programmer

Scheduled Pinned Locked Moved Programmer Humor
programmerhumor
170 Posts 93 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • F [email protected]

    A UUID v4 has 122 bits of randomness. Do you know how long that would take to brute-force, especially with network limitations?

    01189998819991197253@infosec.pub0 This user is from outside of this forum
    01189998819991197253@infosec.pub0 This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #77

    It taking a long time doesn't make it an impossibility. The fact that it has a limit of 122 bits, in and of itself, makes the possibility of a bruteforce a mathematical guarantee.

    C B 2 Replies Last reply
    3
    • C [email protected]

      You cannot!

      01189998819991197253@infosec.pub0 This user is from outside of this forum
      01189998819991197253@infosec.pub0 This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #78

      I cannot. But the bruteforce is a mathematical guarantee.

      C 1 Reply Last reply
      0
      • 01189998819991197253@infosec.pub0 [email protected]

        It taking a long time doesn't make it an impossibility. The fact that it has a limit of 122 bits, in and of itself, makes the possibility of a bruteforce a mathematical guarantee.

        C This user is from outside of this forum
        C This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #79

        For all practical purposes, it's impossible.

        01189998819991197253@infosec.pub0 1 Reply Last reply
        7
        • C [email protected]

          For all practical purposes, it's impossible.

          01189998819991197253@infosec.pub0 This user is from outside of this forum
          01189998819991197253@infosec.pub0 This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #80

          It's not, though. And thinking that it is impossible is why DES, for example, was "translatable" by the NSA for decades. Never assume something is impossible just because it's difficult.

          the_decryptor@aussie.zoneT C 2 Replies Last reply
          1
          • D [email protected]

            Robert'); DROP TABLE Students; --

            cupcakezealot@piefed.blahaj.zoneC This user is from outside of this forum
            cupcakezealot@piefed.blahaj.zoneC This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #81

            aw bobby

            1 Reply Last reply
            3
            • lena@gregtech.euL [email protected]

              As much as I dislike JavaScript, it isn't responsible for this. The person (or AI) and their stupidity is.

              cupcakezealot@piefed.blahaj.zoneC This user is from outside of this forum
              cupcakezealot@piefed.blahaj.zoneC This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #82

              but it didn't help; it was basically the gasoline

              C 1 Reply Last reply
              1
              • 01189998819991197253@infosec.pub0 [email protected]

                It taking a long time doesn't make it an impossibility. The fact that it has a limit of 122 bits, in and of itself, makes the possibility of a bruteforce a mathematical guarantee.

                B This user is from outside of this forum
                B This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #83

                By this logic, all crypto is bruteforcable, on a long enough timeline.

                A 122 bit random number is 5316911983139663491615228241121378303 possible values. Even if it were possible to check 1 trillion records per second, it would take 168598173000000000 years to check all the UUIDs and get the info on all the users. Even if every human on earth signed up for the app (~8 billion people), and you wanted to just find any one valid UUID, the odds of a generating a UUID and that being valid in their DB is basically 0. You can do the math your self following the Birthday Paradox to determine how many times you would need to guess UUIDs before the probability that any one UUID is valid against a population of the whole world is greater than 50%.

                01189998819991197253@infosec.pub0 1 Reply Last reply
                17
                • B [email protected]

                  By this logic, all crypto is bruteforcable, on a long enough timeline.

                  A 122 bit random number is 5316911983139663491615228241121378303 possible values. Even if it were possible to check 1 trillion records per second, it would take 168598173000000000 years to check all the UUIDs and get the info on all the users. Even if every human on earth signed up for the app (~8 billion people), and you wanted to just find any one valid UUID, the odds of a generating a UUID and that being valid in their DB is basically 0. You can do the math your self following the Birthday Paradox to determine how many times you would need to guess UUIDs before the probability that any one UUID is valid against a population of the whole world is greater than 50%.

                  01189998819991197253@infosec.pub0 This user is from outside of this forum
                  01189998819991197253@infosec.pub0 This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #84

                  You should read into the NSA's Translator. Granted, it's relatively outdated with shifting text algorithms, but for a very long time (about half a century), it was able to bruteforce any key, regardless of length, in under an hour.

                  B 1 Reply Last reply
                  0
                  • F [email protected]

                    You know that's not the Tea code, but the downloader, right?

                    the_decryptor@aussie.zoneT This user is from outside of this forum
                    the_decryptor@aussie.zoneT This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #85

                    They're also not using requests very efficiently, so who knows.

                    1 Reply Last reply
                    1
                    • 01189998819991197253@infosec.pub0 [email protected]

                      It's not, though. And thinking that it is impossible is why DES, for example, was "translatable" by the NSA for decades. Never assume something is impossible just because it's difficult.

                      the_decryptor@aussie.zoneT This user is from outside of this forum
                      the_decryptor@aussie.zoneT This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #86

                      UUIDs are essentially random numbers, crypto schemes are not, they're not comparable.

                      01189998819991197253@infosec.pub0 1 Reply Last reply
                      4
                      • the_decryptor@aussie.zoneT [email protected]

                        UUIDs are essentially random numbers, crypto schemes are not, they're not comparable.

                        01189998819991197253@infosec.pub0 This user is from outside of this forum
                        01189998819991197253@infosec.pub0 This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #87

                        The scope isn't if they're crackable (which, if course, they're not, since they're not encrypting anything). The scope is if using UUIDs as filenames in this publicaly accessible db a good way to hide the files. And the answer is: no it is not, because a computer powerful enough can guess all possibilities in a matter of minutes, and query them all against the db to discover all files stored within.

                        C F 2 Replies Last reply
                        0
                        • 01189998819991197253@infosec.pub0 [email protected]

                          You should read into the NSA's Translator. Granted, it's relatively outdated with shifting text algorithms, but for a very long time (about half a century), it was able to bruteforce any key, regardless of length, in under an hour.

                          B This user is from outside of this forum
                          B This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #88

                          I'm not familiar with NSA’s Translator, so any info would be appreciated.

                          I saw your other comment about DES, and it should be noted that DES was with a key length of 56 bits, and that was enforced precisely because the NSA could brute force it. It wasn't even a secret they could brute force 56 bit encryption, and written into law. Back then, if you wanted to use more than 56 bit encryption in the United States, you had to provide a key escrow system to allow the government to decrypt the content if they needed to. Around the 2000s with the rise of e-commerce, they dropped the export restriction because it was doing more harm than good. No one wanted to use so few bits in the encryption keys, but it was illegal at the time to write software which did.

                          A UUID's 122 bits of randomness are exponentially more than the 56 bits DES offered. My original point being, all crypto is inherently brute forceable on an infinite timescale, but key length and implementation decisions are chosen to so that it would be computationally infeasible to brute force.

                          01189998819991197253@infosec.pub0 1 Reply Last reply
                          7
                          • B [email protected]

                            I'm not familiar with NSA’s Translator, so any info would be appreciated.

                            I saw your other comment about DES, and it should be noted that DES was with a key length of 56 bits, and that was enforced precisely because the NSA could brute force it. It wasn't even a secret they could brute force 56 bit encryption, and written into law. Back then, if you wanted to use more than 56 bit encryption in the United States, you had to provide a key escrow system to allow the government to decrypt the content if they needed to. Around the 2000s with the rise of e-commerce, they dropped the export restriction because it was doing more harm than good. No one wanted to use so few bits in the encryption keys, but it was illegal at the time to write software which did.

                            A UUID's 122 bits of randomness are exponentially more than the 56 bits DES offered. My original point being, all crypto is inherently brute forceable on an infinite timescale, but key length and implementation decisions are chosen to so that it would be computationally infeasible to brute force.

                            01189998819991197253@infosec.pub0 This user is from outside of this forum
                            01189998819991197253@infosec.pub0 This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #89

                            The Translator was the nickname given to, what essentially was, the NSA supercomputer that could solve any (non-shift text) encryption by bruteforcing the key in under an hour (most of the time, in about 15 minutes). I mentioned DES, because it was an encryption so old that nearly everyone has heard about it, and one that I know was used on The Translator. And you're right, DES was capped at 56 bit keys, because they could crack it without The Translator, if needed.

                            But the scope isn’t if the UUIDs are crackable (which, of course, they’re not, since they’re not encrypting anything). The scope is if using UUIDs as filenames in this publically accessible db a good way to hide the files. And the answer is: no it is not a good way, because a computer powerful enough can guess all possibilities in a matter of minutes, and query them all against the db to discover all files stored within.

                            B 1 Reply Last reply
                            0
                            • 01189998819991197253@infosec.pub0 [email protected]

                              The scope isn't if they're crackable (which, if course, they're not, since they're not encrypting anything). The scope is if using UUIDs as filenames in this publicaly accessible db a good way to hide the files. And the answer is: no it is not, because a computer powerful enough can guess all possibilities in a matter of minutes, and query them all against the db to discover all files stored within.

                              C This user is from outside of this forum
                              C This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #90

                              The powerful enough computer doesn't exist, and will not exist for some time. And even if it exists, it can't query the web server fast enough to have meaningful effectiveness.

                              So, for all intents and purposes, it's impossible. Period.

                              B 1 Reply Last reply
                              11
                              • 01189998819991197253@infosec.pub0 [email protected]

                                It's not, though. And thinking that it is impossible is why DES, for example, was "translatable" by the NSA for decades. Never assume something is impossible just because it's difficult.

                                C This user is from outside of this forum
                                C This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #91

                                It is. It is practically impossible to guess the file names. You telling otherwise means you don't have sufficient knowledge on the matter.

                                1 Reply Last reply
                                6
                                • P [email protected]

                                  I've dodged the bullet for 20 years, now. I guess i had better get cracking

                                  D This user is from outside of this forum
                                  D This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by [email protected]
                                  #92

                                  You've probably already made your Big Dumb Mistake, it just hasn't been triggered yet.

                                  Or, you just weren't there any more when it triggered.

                                  D 1 Reply Last reply
                                  0
                                  • 01189998819991197253@infosec.pub0 [email protected]

                                    I cannot. But the bruteforce is a mathematical guarantee.

                                    C This user is from outside of this forum
                                    C This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #93

                                    And has nothing to do with my proposition.

                                    1 Reply Last reply
                                    2
                                    • 01189998819991197253@infosec.pub0 [email protected]

                                      The Translator was the nickname given to, what essentially was, the NSA supercomputer that could solve any (non-shift text) encryption by bruteforcing the key in under an hour (most of the time, in about 15 minutes). I mentioned DES, because it was an encryption so old that nearly everyone has heard about it, and one that I know was used on The Translator. And you're right, DES was capped at 56 bit keys, because they could crack it without The Translator, if needed.

                                      But the scope isn’t if the UUIDs are crackable (which, of course, they’re not, since they’re not encrypting anything). The scope is if using UUIDs as filenames in this publically accessible db a good way to hide the files. And the answer is: no it is not a good way, because a computer powerful enough can guess all possibilities in a matter of minutes, and query them all against the db to discover all files stored within.

                                      B This user is from outside of this forum
                                      B This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #94

                                      a computer powerful enough can guess all possibilities in a matter of minutes, and query them all against the db to discover all files stored within.

                                      Again, it would be computationally infeasible on any reasonable timescale of human existence. It's no secret what every possible UUID would be, it's the fact there are 5316911983139663491615228241121378303 of them and trying each one would be futile. They're actually all on https://everyuuid.com/ to see for yourself.

                                      Just for shits, I encrypted a file with a password being a UUIDv4. Here's the encrypted file as base64:

                                      YLIR6fL46HfRmueb1tZWiQUFQHYnZOKO9oujOzhvWYpfTtB5RnHtAvMgUgeIsffLC1wz7D17Vp0VT5YIJMb5pA==
                                      

                                      Here's everything you would need to do to decrypt this file with a password:

                                      $ echo "YLIR6fL46HfRmueb1tZWiQUFQHYnZOKO9oujOzhvWYpfTtB5RnHtAvMgUgeIsffLC1wz7D17Vp0VT5YIJMb5pA==" | base64 -d > file.enc
                                      
                                      $ openssl enc -aes-128-cbc -d -nosalt -in file.enc
                                      enter AES-128-CBC decryption password:
                                      u/[email protected] can't brute force this
                                      

                                      The password to decrypt the file is a UUIDv4. See if you can try every UUID and figure out which one I used as the password.

                                      1 Reply Last reply
                                      4
                                      • R [email protected]

                                        I can tell you exactly what happened. "Hey Claude, I need to configure and setup a DB with Firebase to store images from our application." and then promptly hit shift+tab and then went to go browse Reddit.

                                        nothing was tested. nothing was verified. They let the AI do its thing they checked in on it after an hour or so. once it was done it was add all, commit -m "done", push origin master. AI doesn't implement security stuff. there was zero security here.

                                        Q This user is from outside of this forum
                                        Q This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #95

                                        I have found the exact same type of bug shown here probably over a dozen times, most of those long before AI was writing code.

                                        1 Reply Last reply
                                        1
                                        • C [email protected]

                                          The powerful enough computer doesn't exist, and will not exist for some time. And even if it exists, it can't query the web server fast enough to have meaningful effectiveness.

                                          So, for all intents and purposes, it's impossible. Period.

                                          B This user is from outside of this forum
                                          B This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #96

                                          Thank you for bringing sanity to this thread. At this point, I have to assume that this person is trolling? That or they've been vibecoding too long?

                                          1 Reply Last reply
                                          5
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups