Hacker News new | past | comments | ask | show | jobs | submit | philodeon's comments login

“Veterinary medicine has been predominantly female in the US since 2009. That trend is continuing, with 87.3% of current veterinary school applicants identifying as female, as well as 88% of veterinary technicians.”

(Source: aaha.org)

Given that the gender imbalance in physics/engineering/CS is always blamed on men pressuring women against participating, one wonders, what kind of monstrous women are gatekeeping the veterinary field, and what kind of harassment are they inflicting on men who try to participate?


If you want to make the argument that there are structure impediments to men becoming vets, I'm receptive.

This is really strange reasoning: "people claim that in field X, group Y doesn't enter for reason Z. Therefore if in field A group B isn't entering it MUST be for reason Z, and couldn't possibly be for another reason".

The actual logical problem I was pointing out was in tptacek’s implied argument that “if a field is 80+% one gender, the only possible explanation is that the dominant gender is gatekeeping the minority gender”.

I think that McCartney’s performance of Wonderful Christmastime is absolutely dreadful.

The song itself is not bad. This can be demonstrated by listening to Tuxedo cover it (it’s on YouTube)


To sum up the HN wisdom on Apple Silicon Macs:

Before the M4 models: omg, Apple only gives you 8GB RAM in the base model? Garbage!

After the M4 models: the previous laptops were so good, why would you upgrade?


We'll be sure to run our future comments by you to make sure no one contradicts anyone else.


The stereotype sounds way more homophobic to me than racist…


Book recommendation for you: “IBM And The Holocaust” by Edwin Black.

If IBM (then known as Hollerith) could do that much damage with German census data on punchcards…


> Mankind barely noticed when the concept of massively organized information quietly emerged to become a means of social control, a weapon of war, and a roadmap for group destruction.

From IBM and the Holocaust by Edwin Black.

Imagine the "massively organized information" that will be available to people in power in the future. It doesn't have to be a genocide for it to be useful to them. People in power today are fully on board with "social control" and it's so uncontroversial that they talk about it openly.


Two-word phrases are rarely preferable to a single word. So let’s just use “hybristophilia” instead.


> Two-word phrases are rarely preferable to a single word.

I think you wanted to write "diwords are raripotiorous than monowords".


> and doing what they did with Dual-EC, where it was impossible (apparently) for people to reason about what NSA was up to.

Schneier was clearly able to reason about what NSA was up to, and told everyone in 2007 not to use Dual-EC, 6 years before the Snowden revelations.

I believe you have admitted that you thought that “Dual-EC has a backdoor” was a wild conspiracy theory until the Snowden revelations? Which makes the “impossible (apparently)” part a classic case of projection.


The (apparently) was a dunk on me.

(I thought nobody should use Dual EC! But that was my reason for thinking it wasn't an NSA backdoor, because it was too dumb to be one. I underestimated the industry's capacity for "dumb". Also: I was dumb! I am dumb a lot.)


And now you believe it’s impossible for any of the NIST PQC submissions to have been backdoored or weakened. I feel safer already. :D


NIST didn't design any of the PQC submissions. It did design Dual EC.


NIST didn’t design Dual-EC, NSA did. But NIST did the really hard work, which involved slapping their organization’s name on it, and not asking any inconvenient questions.

Thankfully we found a better way that ensures cryptographic security, which is to get former NSA interns to write the PQC standards, instead of proper NSA employees.


As a shorthand for this site, I'm not distinguishing between the two organizations. Which former NSA interns are you talking about? You can get their names from the pq-crystals.org site. Which one should we not be trusting?


Is it maybe Tancrede Lepoint? He always seemed shady to me. Or Peter Schwabe?


A wonderful question that exposes me to legal action if I answer.

A better question: why do you think so many of your cryptographic feline friendz were so excited about isogenies for the past decade? Where do you think they all obtained that identical enthusiasm from? Why do you think SIKE made it so far in the contest and only got eliminated through luck?


Your theory here is that NSA coordinated an action whereby the PQC standard selected could be broken by anybody in the world with a Python script, based on research disclosed to the public in the 1990s.

I'm guessing this isn't a conversation that's going to take us into Richelot isogenies.


You obviously know that the Python script wasn’t submitted to NIST along with the draft standard.

Is Dual-EC-DRBG fine because we never saw the FVEY Python exploit that breaks it?

I think my theory here is that NSA coordinated an action whereby they figured no one was reading obscure algebraic geometry papers from 1997. In our low-attention-span world, it’s not the worst plan.

(Hell, folks didn’t realize TAOSSA contained 0day for a long time. Simply putting something in front of the public doesn’t mean they’ll read or comprehend it.)


It is literally the worst plan, because it leaves every PQC-protected system in the world exposed to everybody in the world. It's a theory that depends on NSA just wanting to watch the world burn.

Dual EC isn't broken by an exploit script. It's broken with a secret key.


> It is literally the worst plan, because it leaves every PQC-protected system in the world exposed to _everybody in the world_.

No, it leaves every SIKE-protected system in the world exposed to _everybody who reads obscure algebraic geometry papers from 1997._ We got really lucky that the two dorks who do read those papers decided to share their insights.

For all you know, there’s a paper sitting at the Institute For Advanced Study that would let you write a marvelous pq-crystals-shattering Python script, but they’ll never tell you the combination to the safe.

(Again: TAOSSA contained 0day exploits, and few noticed for a decade.)


You seem to believe the only thing preventing people from exploiting Dual EC is not having read the right cryptography papers. No; the reason why that's not the case is plainly evident from Dual EC's structure (if that were true, the NSA would presumably have no need of Dual EC!). Our premises are too far apart to usefully discuss this.


I thought PQC systems were wrapping classical encryption within the PQC protection so even if you broke PQC you'd still be left having to crack classical. Of course some hypothetical future QC could then accomplish this task so the future proofing goal of PQC would be violated.


The proposal is to do exactly this (hybrid schemes using a pre and a post quantum scheme).

However in this context the debate is just over the PQ scheme (not the overall system). Also, NSA are not planning to mandate a hybrid system for government use. Others may do the same.


I don't know if I count as a "feline friend", but: SIDH kept the DH shape. Being able to upgrade the protocols we had relatively closely is appealing. "Structure is useful but seems precarious" wasn't exactly secret knowledge.


Of the SCW hosts, I'm actually the NSA plant. You got me.


What people on these threads aren't prepared to grok is that cryptography engineers (even the older ones) are gothy af, and the isogeny graph diagrams all looked like black magic stuff out of the Lesser Key of Solomon. Sorry, there isn't more to it than that.


If you’d like to see a pervasive cult of personality in South Korea, check out the Unification Church.


Port knocking is a ludicrous security measure compared to the combination of: * configuring sshd to only listen over a Wireguard tunnel under your control ( or letting something like Tailscale set up the tunnel for you) * switching to ssh certificate authn instead of passwords or keys


Does Wireguard work in such a way that there is no trace of its existence to an unauthorized contacting entity?

I used port knocking for a while many years ago, but it was just too fiddly and flaky. I would run the port knocking program, and see the port not open or close.

If I were to use a similar solution today (for whatever reason), I'd probably go for web knocking.

In my case, I didn't see it as a security measure, but just as a way to cut the crap out of sshd logs. Log monitoring and banning does a reasonable job of reducing the crap.


That's one of the original design requirements for wireguard. Unless a packet is signed with the correct key, it won't respond at all.


Calling this a “detailed review” of two laptops when the author continually asserts that they don’t use their laptops as a laptop is pretty audacious.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: