• 0 Posts
  • 65 Comments
Joined 1 year ago
cake
Cake day: June 20th, 2023

help-circle




  • I’m guessing you don’t work in corporate environment or no longer work from home.

    There are times when video is expected to be on, but you don’t want to show your room to everyone.

    Having said that I can’t think of firefox being able to stream video yet not being able to do this, so likely it is Google’s way to make its competitor look subpar. Probably can be fixed by spoofing user agent. Ironically the most recent change in Chrome will make this very difficult in the future.




  • When I said half life, I made a mental shortcut that it degrades into harmless compounds.

    The 12 days just means how long the body keeps most of tritium.

    You are talking how much radiation the water causes and that it is smaller than radiation from banana, and I’m talking that this “banana” stays in your body for 12 days and part of it your body integrates by replacing your hydrogen with its radioactive counterpart.

    You work with radiation, but this isn’t just about radiation, but also involves organic chemistry and metabolism.


  • That 12 days is not a half life, but it is how long it stays in the body before you pee it out. This only matters if you had a single incident of drinking the water or eating contaminated food not if you are constantly exposed to it then each time you consume affected foods you know it stays with you for about 12 days and small part of it stays with you forever as your body doesn’t see the difference between tritium and hydrogen, so it will be happy to use the radioactive version, which could increase your chances of cancer as well as your future generations.









  • In an ideal encryption, the resulting data should be indistinguishable from random when doing statistical analysis.

    So yes, such data will be really hard to compress, so typically compression is done before encryption.

    Now here’s a twist. The compression before encryption can reveal some details about the encrypted data. This is especially true if attacker has a way to generate encrypted message with part of information that is being encrypted (for example some kind of token etc).
    There were attacks on it. For example https://en.wikipedia.org/wiki/CRIME or https://en.wikipedia.org/wiki/BREACH (this was during that idiotic phase where vulnerabilities had those lame-ass names and they even created webpages)

    Ideally compression would be done after encryption, but because of issues described earlier, that wouldn’t give any benefit.