Hacker Newsnew | past | comments | ask | show | jobs | submit | clysm's commentslogin

3. There are WAY more things to get corrupted on a computer system than tokens. And non-determinism does NOT mean it’s tolerant to faults. Random values are intentionally introduced at the right moment for LLMs.

Nothing in Michigan? The state with the most light houses out of any in the US?

You know what - I completely neglected the entire Great Lakes region. Let me regenerate the data and update it.

Updated it! Take a look in a few mins and you should see those Michigan lights

Had noticed the same issue. Looks good now, thanks.

Kind of like… a “hidden reset”…


The title itself is not the problem, although even that is sensationalized. I was referring to the contents of the article, which have statements like this:

"Is there a way for you to spin the top again so it ends up in the exact position it started, as if you had never spun it at all? Surprisingly, yes..."

Which, as an introduction, just misses the mark completely by highlighting the least surprising possible interpretation of the research.


Chase bank…


No. It’s 100% a design choice by the manufacturer to make them look weird.

Even with the benefits of EV packaging, manufacturers chose to make them “different” on purpose, which really put off the vast majority of buyers. Tesla had so much success because they were practically the first manufacturer to make something look somewhat normal and have good stats.

Now, BMW finally learned and has their 4 and 5 series EV cars share a common platform with the ICE. There is no physical difference in style other than the front grill.


Why is this linking to a merged PR, or a PR at all, and not a status page?


It must be back up!


More than just IPv4 priorities, almost all other IPv6 addresses are given higher priority which makes routing between ULAs on an internal network problematic.

That draft doc seems to fix multiple problems at once.


I really hate the “someone will certainly solve this problem!” mentality.

You can’t just magically update the protocol to work around the ability of someone to break elliptic curve cryptography. That not how this works. It’s not how any of this works.


You… can.

Once people catch wind of bitcoin being moved from secure places, nodes will cease processing transactions, quantum capable thieves will be frozen

Network will upgrade if it hasnt already, nodes will only process transactions on the network with the most other nodes

They might even resume from a few block back. No different than branching from an old commit

If this doesnt match your philosophy of legitimacy, you can try continuing in the orphanage chain and get other nodes to join you. May the longest chain win!

This has all been theorized before and has subsequently happened before and the resolution has given confidence to attract more capital.


And what happens to all those cold wallets where people can recover the secret key or forge signatures for it? They money is just gone, either by thieves or the network disallowing them to be spent.


> You can’t [...] update the protocol to work around the ability of someone to break elliptic curve cryptography

Have you reviewed any of the proposals to do exactly that? https://bitcoinops.org/en/topics/quantum-resistance/


It helps build a new system, but all existing wallets would be hackable until they migrate. And we expect everyone to have the time and resources to do that? For a “store of value” system?

All of my hardware wallets are now worthless? All of the hardware security modules used for wallets managed by corporations no longer work?

It's an absolute mess for so many reasons that a "protocol fix" just doesn't cover.


> all existing wallets would be hackable until they migrate

Not necessarily. See "Discussion of Guy Fawkes signatures to protect some current bitcoins against quantum theft" and "Commit/reveal function for post-quantum recovery of insecure bitcoins" sections of the Optech page.


Isn’t that exactly how it works?

You agree on a post-quantum algorithm…

https://en.m.wikipedia.org/wiki/Post-quantum_cryptography

Then you update the protocol…

https://www.reddit.com/r/Bitcoin/comments/qth9ii/how_does_bi...

Right?


How would you protect all the old stuck or stale BTC wallets that used the original crypto? An awful lot of cold-stored or presumed-lost BTC would be hard or impossible to migrate to post-quantum protection, no? A quarter of mined BTC? Half?

More of an economic than technical puzzle these days. But wouldn't you need users to protect their wallets post-fork?


You tell people that value their bitcoin to migrate to new wallets. Bitcoin is self sovereignty and self-ownership. You are responsible for securing your own wallet.

The bitcoin that has been lost doesn't matter, because it's lost. That becomes fair game to whoever can find the computational resources to crack the cryptography of the wallets to get to it. At that point BTC will probably be $500k-$1M in price, and it might just be the driving force behind mainstream adoption of quantum computing.


A forced migration is basically just making a brand new system. It’s not a “protocol fix”.


Except LLMs that tell the student wrong answers, or the person needing therapy to kill themselves.


Tutors often tell students the wrong answer too!


It is that trivial. The problem is vendor lock-in and no common, defined way to export/import them securely (which is going to change soon).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: