Recent comments in /f/Futurology

mafco OP t1_jbf6ik0 wrote

Biden's Inflation Reduction Act, a massive clean energy and electric vehicle bill passed by congress and signed into law last August, is much, much more than just a greenhouse gas emissions reduction policy.

The genius of the bill was incorporation of industrial policy to incentivize the growth of US domestic supply chains for everything from batteries to electric vehicles to solar panels. So far the response from industry has been almost breathtaking with a flurry of new factory announcements, tens of billions of dollars in new manufacturing investments and 100,000 new jobs so far. The ultimate goal is re-industrializion of the US economy and millions of new good paying middle class and whit collar jobs.

3

donrhummy t1_jbey87d wrote

It's not. You can steal the pad (and you have to get each person that pad which is a time of vulnerability) or socially engineer the person, and it also depends on the entropy and the algorithm used. You need a very long one time pad to be safe from brute force, and the algorithm needs to not have a backdoor (which isn't as easy as it seems). And even that's not forever safe one we get quantum computers.

0

Sarcasm-n-Caffeine t1_jbelvhu wrote

It wasn't developed until last year. But I'll believe whatever a random keyboard warrior says before i believe viable sources. Yup makes perfect sense.

1

AaronElsewhere t1_jbefzz1 wrote

It's not exceptionally revolutionary technology. It's a technique that has been described before.

Yes, if-and-only-if you had the source file before and after information had been embedded, then absolutely you can tell some encrypted data must have been added(but not necessarily what it was).

However, as a third party(say an oppressive government) looking at maybe images published from IPs within your country and trying to determine if any contain encrypted messages, it is conceivably impossible because you don't have the original file. Since compression already introduces a level of noise, if your encrypted message doesn't introduce more noise than is present then a third party can't distinguish an innocuous image with normal artifacts from compression versus those that have artifacts resulting from embedding encrypted information.

If I generate semi original images such as a meme and embed data in those, then third parties don't have any original files to generate hashes of for comparison against. This is where you're misunderstanding how these techniques are applied.

1

Odd_Mathematician_80 t1_jbedvjh wrote

This is only true if you have the original file to compare the altered file against. It is possible to determine a file has been altered but it now much more difficult to do so. M/L algorithms on known file types should be able to discover these modifications, identifying that there is probably a needle in this haystack, but as the paper explains it is harder to detect the presence of a secret and the secret is still protected even if you find it.

1

burnnottice88 t1_jbe30no wrote

Then that guy will have ads for coffee machines, running gear and similar things shoved in his face. And because of all the additional info gathered from that guy the ad companies know when, and how often to show the ads to maximize the probability that he will buy something.

They're are no winners here except the people who have all this information.

1

hxckrt t1_jbe0qp6 wrote

Doesn't work that way. A backdoor would indeed give access, but vulnerabilities are different. Exploits are valuable and used sparingly. It's not a key you can keep secret, if someone is recording the internet traffic with something like wireshark, they can steal the exploit or help the manufacturer fix it.

1