Recent comments in /f/Futurology
[deleted] t1_jbf5cfw wrote
donrhummy t1_jbf545z wrote
Reply to comment by [deleted] in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
That's correct. That's why they invented elliptical and threshold cryptography.
dGFisher t1_jbf4umh wrote
Reply to A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
Sounds like the FBI is about to sting some suckers again.
[deleted] t1_jbf2vic wrote
donrhummy t1_jbey87d wrote
Reply to comment by [deleted] in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
It's not. You can steal the pad (and you have to get each person that pad which is a time of vulnerability) or socially engineer the person, and it also depends on the entropy and the algorithm used. You need a very long one time pad to be safe from brute force, and the algorithm needs to not have a backdoor (which isn't as easy as it seems). And even that's not forever safe one we get quantum computers.
ghostcatzero t1_jbexj5q wrote
Reply to comment by Sarcasm-n-Caffeine in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
Yes be a good docile servant to big government and always believe everything they say lol
Sarcasm-n-Caffeine t1_jbelvhu wrote
Reply to comment by ghostcatzero in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
It wasn't developed until last year. But I'll believe whatever a random keyboard warrior says before i believe viable sources. Yup makes perfect sense.
AaronElsewhere t1_jbefzz1 wrote
Reply to comment by volci in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
It's not exceptionally revolutionary technology. It's a technique that has been described before.
Yes, if-and-only-if you had the source file before and after information had been embedded, then absolutely you can tell some encrypted data must have been added(but not necessarily what it was).
However, as a third party(say an oppressive government) looking at maybe images published from IPs within your country and trying to determine if any contain encrypted messages, it is conceivably impossible because you don't have the original file. Since compression already introduces a level of noise, if your encrypted message doesn't introduce more noise than is present then a third party can't distinguish an innocuous image with normal artifacts from compression versus those that have artifacts resulting from embedding encrypted information.
If I generate semi original images such as a meme and embed data in those, then third parties don't have any original files to generate hashes of for comparison against. This is where you're misunderstanding how these techniques are applied.
Odd_Mathematician_80 t1_jbedvjh wrote
Reply to comment by volci in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
This is only true if you have the original file to compare the altered file against. It is possible to determine a file has been altered but it now much more difficult to do so. M/L algorithms on known file types should be able to discover these modifications, identifying that there is probably a needle in this haystack, but as the paper explains it is harder to detect the presence of a secret and the secret is still protected even if you find it.
volci t1_jbedhen wrote
Real-Problem6805 t1_jbe6xei wrote
Real-Problem6805 t1_jbe6s8k wrote
Reply to comment by teothesavage in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
No but it is part of the character I play there are always truths hidden in lies.
[deleted] t1_jbe3o7j wrote
[removed]
burnnottice88 t1_jbe30no wrote
Reply to comment by tRONzoid1 in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
Then that guy will have ads for coffee machines, running gear and similar things shoved in his face. And because of all the additional info gathered from that guy the ad companies know when, and how often to show the ads to maximize the probability that he will buy something.
They're are no winners here except the people who have all this information.
tRONzoid1 t1_jbe2973 wrote
Reply to comment by burnnottice88 in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
Until it comes across a guy who drinks coffee and runs a lot
[deleted] t1_jbe0u6p wrote
hxckrt t1_jbe0qp6 wrote
Reply to comment by D1rtyH1ppy in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
Doesn't work that way. A backdoor would indeed give access, but vulnerabilities are different. Exploits are valuable and used sparingly. It's not a key you can keep secret, if someone is recording the internet traffic with something like wireshark, they can steal the exploit or help the manufacturer fix it.
[deleted] t1_jbe0pw2 wrote
teothesavage t1_jbe0ppk wrote
Reply to comment by Real-Problem6805 in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
Is this comment a lie as well?
FalseTebibyte t1_jbdwxwu wrote
Reply to A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
It's based on the Zero Trust Model.
That is to say, we're in a mindscape and they've realized that secrecy is really quite stupid.
Groundbreaking_Rock9 t1_jbdtiry wrote
Reply to comment by kropkiide in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
So that they can make people who talk bad about them disappear.
Groundbreaking_Rock9 t1_jbdteyh wrote
Reply to comment by HastyBasher in A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden by thebelsnickle1991
You can find it on PBS's YouTube channel. I think they did a 3-part series. It's really good.
mafco OP t1_jbf6ik0 wrote
Reply to Reviewing the U.S. solar panel value chain manufacturing capacity. Following the passage of the Inflation Reduction Act (IRA), an energized solar industry is aiming high and envisioning a future where the U.S. has a robust domestic energy supply chain. by mafco
Biden's Inflation Reduction Act, a massive clean energy and electric vehicle bill passed by congress and signed into law last August, is much, much more than just a greenhouse gas emissions reduction policy.
The genius of the bill was incorporation of industrial policy to incentivize the growth of US domestic supply chains for everything from batteries to electric vehicles to solar panels. So far the response from industry has been almost breathtaking with a flurry of new factory announcements, tens of billions of dollars in new manufacturing investments and 100,000 new jobs so far. The ultimate goal is re-industrializion of the US economy and millions of new good paying middle class and whit collar jobs.