Conversation
Notices
-
poni 38(t), pervyy v mire (pony@blovice.bahnhof.cz)'s status on Wednesday, 02-Sep-2020 22:26:14 JST poni 38(t), pervyy v mire you wouldn't believe how difficult is to explain to a bunch of "security experts" that in order for the symmetric encryption thingie to work properly, both parties need to have the same key -
バツ子(痛いの痛いの飛んでけ;; (shmibs@tomo.airen-no-jikken.icu)'s status on Wednesday, 02-Sep-2020 22:26:12 JST バツ子(痛いの痛いの飛んでけ;; @pony wat -
バツ子(痛いの痛いの飛んでけ;; (shmibs@tomo.airen-no-jikken.icu)'s status on Wednesday, 02-Sep-2020 22:28:05 JST バツ子(痛いの痛いの飛んでけ;; @pony very weird -
poni 38(t), pervyy v mire (pony@blovice.bahnhof.cz)'s status on Wednesday, 02-Sep-2020 22:28:06 JST poni 38(t), pervyy v mire @shmibs they generally fail to grasp the idea of key eventually being just few bytes of just data -
バツ子(痛いの痛いの飛んでけ;; (shmibs@tomo.airen-no-jikken.icu)'s status on Wednesday, 02-Sep-2020 22:34:05 JST バツ子(痛いの痛いの飛んでけ;; @pony is this like some government-type group or something? infosec people have known here like hands-on booping bytes into remote servers to mess with them -
poni 38(t), pervyy v mire (pony@blovice.bahnhof.cz)'s status on Wednesday, 02-Sep-2020 22:34:06 JST poni 38(t), pervyy v mire @shmibs they are used to thinking in more abstract and grandiose concepts than few bytes somewhere being the same as few bytes somewhere else
-