Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. memes
  3. Benefit of the hindsight

Benefit of the hindsight

Scheduled Pinned Locked Moved memes
memes
143 Posts 81 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S [email protected]

    How do you know a crypto scheme is a scam?
    You already know, the answer is "yes". It's always "yes".
    The only question is, can you hold the tiger's tail just long enough to make a mint and still let go in time that you aren't the last one holding it.

    G This user is from outside of this forum
    G This user is from outside of this forum
    [email protected]
    wrote on last edited by [email protected]
    #130

    Scam or not some of them are very useful to pay for some not so legal things

    Investing in currency is already dumb, in cryptocurrency? Doubly so

    1 Reply Last reply
    0
    • S [email protected]

      Unfortunately for them that ship has sailed. It's not hard to get in on a scam like this of you do it early enough, i probably would have done it if i had enough money when this started (don't judge, much, money is important when you don't have it) and i probably would have gotten out like a bandit. Now though, it's mostly targeting them.

      G This user is from outside of this forum
      G This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #131

      Nobody is going to judge a cute and awkward baby trans girl needing cash on my watch. That’s for sure.

      1 Reply Last reply
      0
      • R [email protected]

        Sounds to me like you never read the Bitcoin whitepaper.

        A This user is from outside of this forum
        A This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #132

        People don't care because crypto is literally a made up thing.

        Sure, people make money off of it. But people make money off loads of things. That doesn't change that it's literally a made up currency that has tons of people scamming the shit out of people for a quick buck.

        1 Reply Last reply
        0
        • A [email protected]

          I used to work in Tech back in the late 90s, during the first bubble and up to the Tech Crash. I also worked in both Investment Finance and Tech Startups much more recently.

          I can't even begin to describe just how angry, disgusted and dissapointed this unholly intersection between Tech and Hyperspeculative-Finance of the XXI century makes me.

          The whole spirit in pretty much the entire domain of Tech back in the 90s was completely different from this neverending bottomless swamp of crap we have in the supposedly innovative parts of Tech.

          Ever since the sleazy slimeballs who saw from the first Tech bubble that there were massive opportunities to use Tech-mumbu-jumbo to extract money from suckers started (immediatly after the Crash) trying to pump the Net bubble back up (they even called it Web 2.0) that the old spirit of innovation for the sake of improving things of the old days in Tech was crushed and replaced by the most scammy, fraudulent, naked greed imaginable.

          After my time in Finance (which, curiously, also involved a Crash in the Industry I was working in) I started describing Tech Startups as "The Even Wilder Wild West of Speculative Finance".

          A This user is from outside of this forum
          A This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #133

          Fuck. Yup. I was working in industrial automation in the late 90s, and then transitioned to network engineering at a global scale. Around 2000, the entire vibe seemed to shift. I walked out just before 9/11 and am so glad to be in an entirely different industry now.

          1 Reply Last reply
          0
          • S [email protected]

            Did we make fun of bitcoin? It was a cool currency for buying drugs on the black market at first.

            A This user is from outside of this forum
            A This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #134

            I made fun of it immediately, despite also recognizing and using its ability to facilitate online purchases of contraband.

            1 Reply Last reply
            0
            • D [email protected]

              This is a very legit concern. But to my understanding, it is possible to make the the camera that's very hard to crack, by putting security enclave or whatever it is that makes phones hard to unlock, right inside the CCD chip. Even if somebody manages to strip off the top layer, chart out the cryptographic circuit, probe the ROM inside, etc and extract the private key, it should be possible upon finding it to revoke the key to that camera or even the entire model and make it even more painful in further models.

              Another concern is of camera being pointed to the screen with a fake image, but I've searched and yet to find a convincing shot that doesn't look like, well, a photo of a screen. But for this concern I think the only counter-measure would be to add photographer and publisher signatures to the mix, so that if anyone is engaging in such practice is caught, their entire library goes untrusted upon revocation. Wouldn't be completely foolproof, but better than nothing, I guess.

              S This user is from outside of this forum
              S This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #135

              That's security by obscurity. Given time, an attacker with physical access to the device will get every bit data from it. And yes, you could mark it as compromised, but then there's nothing stopping the attacker from just buying another camera and stripping the key from that, too. Since they already know how. And yes, you could revoke all the keys from the entire model range, and come up with a different puzzle for the next camera, but the attacker will just crack that one too.

              Hiding the key on the camera in such a way that the camera can access it, but nobody else can is impossible. We simply need to accept that a photograph or a video is no longer evidence.

              The idea in your second paragraph is good though, and much easier to implement than your first one.

              M 1 Reply Last reply
              0
              • J [email protected]

                And why do I need a Blockchain for that?

                I could host my own ticket shop where tickets are only possible to check in if you have a passport and trading is impossible since it is bound to the person who bought it.

                And trading can be made possible with the same platform that sells the tickets

                R This user is from outside of this forum
                R This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #136

                Sure you can, but then we basically create the same situation as with Ticketmasters, all tickets will then eventually flow through your company and you can change policies again and we will end up with the same problems. With a blockchain solution (doesn't have to be blockchain for NFT's though) this platform can be decentralized and self managed, the rules are baked into the protocol, it can only be changed with the majority of voting rights. It basically enables the infrastructure for artists to control ticket sales (and reading at the gate) themselves, without having to use an agency. In your scenario, they would still need an agency.

                1 Reply Last reply
                0
                • S [email protected]

                  That's security by obscurity. Given time, an attacker with physical access to the device will get every bit data from it. And yes, you could mark it as compromised, but then there's nothing stopping the attacker from just buying another camera and stripping the key from that, too. Since they already know how. And yes, you could revoke all the keys from the entire model range, and come up with a different puzzle for the next camera, but the attacker will just crack that one too.

                  Hiding the key on the camera in such a way that the camera can access it, but nobody else can is impossible. We simply need to accept that a photograph or a video is no longer evidence.

                  The idea in your second paragraph is good though, and much easier to implement than your first one.

                  M This user is from outside of this forum
                  M This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #137

                  No, it is not security through obscurity. It's a message signature algorithm, which are used in cryptography all the time.

                  You're falling for the classic paradox of security: it has to work for someone. OF COURSE if you get all of the keys and every detail of the process you can crack it. That's true of ALL CRYPTOGRAPHY. If someone knows everything including the keys, it's too late for any 'secure' device.

                  S 1 Reply Last reply
                  0
                  • A [email protected]

                    The blockchain is distributed.

                    For example, you might use it as a trademark registry or to certify a chain of legal evidence. You can validate a presented copy matches the original and what the chain of ownership was. And you can do this without the single point of failure of a nationwide database

                    M This user is from outside of this forum
                    M This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #138

                    Who holds and validates the original you're comparing to?

                    A 1 Reply Last reply
                    0
                    • M [email protected]

                      No, it is not security through obscurity. It's a message signature algorithm, which are used in cryptography all the time.

                      You're falling for the classic paradox of security: it has to work for someone. OF COURSE if you get all of the keys and every detail of the process you can crack it. That's true of ALL CRYPTOGRAPHY. If someone knows everything including the keys, it's too late for any 'secure' device.

                      S This user is from outside of this forum
                      S This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #139

                      No, it is not security through obscurity. It’s a message signature algorithm, which are used in cryptography all the time.

                      Yes it is. The scheme is that when you take a picture, the camera signs said picture. The key is stored somewhere in the camera. Hence the secrecy of the key hinges on the the attacker not knowing how the camera accesses the key. Once the attacker knows that, they can get the key from the camera. Therefore, security hinges on the secrecy of the camera design/protocol used by the camera to access the key, in addition to the secrecy of the key. Therefore, it is security by obscurity.

                      M 1 Reply Last reply
                      0
                      • M [email protected]

                        Who holds and validates the original you're comparing to?

                        A This user is from outside of this forum
                        A This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #140

                        That’s the point, a use case where no one has to. It’s only the record of ownership.

                        And clearly you’d still need to make arrangements to prevent multiple chains of ownership for a copied artifact

                        NFTs make the mistake of assuming that somehow makes it unique, forgetting you can just copy the original. However these use cases work from the opposite direction: given an accused infringement, does that match?

                        Consider the current use case for trademark. Someone creates a trademark and registers with an authority. At some point they may renew modify, or sell. After some time, that authority has a database containing the original and a chain of ownership. Blockchain could serve this identically, with the potential advantage of the chain being self contained and distributable

                        M 1 Reply Last reply
                        0
                        • A [email protected]

                          That’s the point, a use case where no one has to. It’s only the record of ownership.

                          And clearly you’d still need to make arrangements to prevent multiple chains of ownership for a copied artifact

                          NFTs make the mistake of assuming that somehow makes it unique, forgetting you can just copy the original. However these use cases work from the opposite direction: given an accused infringement, does that match?

                          Consider the current use case for trademark. Someone creates a trademark and registers with an authority. At some point they may renew modify, or sell. After some time, that authority has a database containing the original and a chain of ownership. Blockchain could serve this identically, with the potential advantage of the chain being self contained and distributable

                          M This user is from outside of this forum
                          M This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #141

                          That is not how the chain has worked or could ever work. There is a reason after over fifteen years people are still speculating how blockchain can be useful.

                          1 Reply Last reply
                          0
                          • S [email protected]

                            No, it is not security through obscurity. It’s a message signature algorithm, which are used in cryptography all the time.

                            Yes it is. The scheme is that when you take a picture, the camera signs said picture. The key is stored somewhere in the camera. Hence the secrecy of the key hinges on the the attacker not knowing how the camera accesses the key. Once the attacker knows that, they can get the key from the camera. Therefore, security hinges on the secrecy of the camera design/protocol used by the camera to access the key, in addition to the secrecy of the key. Therefore, it is security by obscurity.

                            M This user is from outside of this forum
                            M This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #142

                            And how do they get the camera? You could make the same exact claims about SSH being useless because "if an attacker gets the key, it's over!"

                            NO SHIT!!

                            S 1 Reply Last reply
                            0
                            • M [email protected]

                              And how do they get the camera? You could make the same exact claims about SSH being useless because "if an attacker gets the key, it's over!"

                              NO SHIT!!

                              S This user is from outside of this forum
                              S This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #143

                              They buy it at a store.

                              1 Reply Last reply
                              0
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups