Hacker Newsnew | past | comments | ask | show | jobs | submit | ryandv's commentslogin

The signing keys used by the Certificate Authority to assert that the client (leaf) certificate is authentic through cryptographic signing differ from the private keys used to secure communication with the host(s) referenced in the x509 CN/SAN fields.

I know that. At issue is the fact that the signing keys can be used to sign a MITM key. If there were multiple signatures on the original key, it would (or could) be a lot harder to MITM (presumably). Do you trust any CA enough to never be involved in this kind of scandal? Certainly government CA's and corporate CA's MITM people all the time.

Edit: I'm gonna be rate limited, but let me just say now that Certificate Transparency sounds interesting. I need to look into that more, but it amounts to a 3rd party certificate verification service. Now, we have to figure out how to connect to that service securely lol... Thanks, you've given me something to go read about.


This is where Certificate Transparency -- and it being mandatory for browser trust -- comes in to save the day.

> the global leaderboard had to be pulled.

Frankly I'm better off with it being this way instead of the sweaty cupstacking LLM% speedrun it became as it gained popularity.


Why try any more? There are so many fucking frauds in this field.

They... sort of are though? A year or two ago I just waited until the very last problem, which was min-cut. Anybody with a computer science education who has seen the prompt Proof. before should be able to tackle this one with some effort, guidance, and/or sufficient time. There are algorithms that don't even require all the high-falutin graph theory.

I don't mean to say my solution was good, nor was it performant in any way - it was not, I arrived at adjacency (linked) lists - but the problem is tractable to the well-equipped with sufficient headdesking.

Operative phrase being "a computer science education," as per GGP's point. Easy is relative. Let's not leave the bar on the floor, please, while LLMs are threatening to hoover up all the low hanging fruit.


You say in your comment: "Anybody with a computer science education ... should be able to tackle this one" which is directly opposed to what they advertise: "You don't need a computer science background to participate"

Do you understand the comment thread you are replying to?

"Anybody with a computer science education who has seen the prompt Proof. before should be able to tackle this one with some effort, guidance, and/or sufficient time."

I have a computer science education and I have no idea what you're talking about. The prompt "Proof." ?

Most people who study Comp Sci never use any of what they learned ever again, and most will have forgotten most of what they learned within one or two years. Most software engineers never use any comp sci theory at all, but especially not graph theory or shit like Dijkstras algorithms, DFS, BFS etc.


Holy fuck. I should just grow coconuts or something in the remote Philippines.

> Most software engineers never use any comp sci theory at all, but especially not graph theory or shit like Dijkstras algorithms, DFS, BFS etc.

But we are talking about Advent of Code here, which is a set of fairly contrived, theoretical, in vitro learning problems that you don't really see in the real software engineering world either.

> The prompt "Proof." ?

See this paper on the Stoer-Wagner min-cut algorithm from graph theory, for the last problem in a previous year's Advent of Code: https://www.cs.dartmouth.edu/~ac/Teach/CS105-Winter05/Handou...

> I have a computer science education and I have no idea what you're talking about.

A post-secondary computer science education? I don't mean bootcamp. I mean a course of study in mathematics.


I have a bachelor's degree in Computer Science, which I assume is what you are referring to by "computer science education".

My only assumption is that you're really out of touch with the ordinary world of humanity if you think most people are aware of stuff like this:

https://www.cs.dartmouth.edu/~ac/Teach/CS105-Winter05/Handou...


Obligatory uwaterloo plug. I didn't even end up graduating after 3 years of compsci but still ended up with almost two years of work experience. Colleagues in my early career were still paying down student debt while I had already paid for tuition out of pocket, not with tax dollars.

Funny too, because I had a philosophy professor there who talked about how the university is not a vocational school, but a place one goes to enrich the mind and become a more worldly citizen.


I commend you for your choices. This is the way in the 2020s.


I'll corroborate your position.


Same.


I'm going to break the law right now and watch some illegally downloaded movies. MPAA RIAA FBI CIA NSA come at me


> It's the best platform to stalk people and collect any info using OSINT.

It's the main platform of interest if you ever talk to data brokers just because of the richness of personal information, employment history, and social network (connections) information present there. Microsoft is sitting on a goldmine of personally-identifiable information, and the platform is aggressively scraped every millisecond for new data.


Bingo. Your message is only what the medium promotes.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: