Comment on: Just graduated, 22 and got a b.s.; Am working in a startup. Is the 10k coding bootcamp worth it?
0 05 Sep 2017 11:24 u/CujoQuarrel in v/programmingComment on: Q. What's today's top language? A. Python... no, wait, Java... no, C
I'd go with English.
Comment on: Where should I ask for help with my naive ideas about cryptography?
You have to use sneakernet as I said it's not very flexible. I'd also say it's more like a book cypher than a one-time pad unless you did only use each character once. Since I'd say your messages would be so small compared to the 'book' any repeats would happen so irregularly that you would not be able to use frequency methods. Lets face it with 4 billion characters and messages of about 1k I don't think repeats would be likely.
Generating the pad/book has to be random. One of the best I've seen is the way TrueCrypt/Veracrypt does it using random mouse moves. i'd say that that is pretty much random since even if you tried you couldn't repeat the EXACT same mouse gestures. If you aren't familiar with their method you move the mouse all over the screen for several minutes and it uses that as the seed for the generator.
If you were a spy you'd carry your 'key' on a micro SD card till you got into the targeted country. If you got caught infiltrating the country you'd not send the 'I'm OK' back to tell your compatriots that it's safe to send you messages. The messages you receive should be small with things that you are supposed to preform. To get the message to you it could be posted somewhere that you and they know like some obscure web site message boards , like VOAT, that almost no one reads at some fixed time. Or some cat themed message board . Etc.
You could add other obfuscations to the message if you wanted like an offset that is dependent on some other factor such as date but I doubt that it would be needed.
What do other systems use to encode a message where you don't have some form of sneaker net? Since anything sent electronically is vulnerable how to you get the key/decoder to the other party?
Comment on: Where should I ask for help with my naive ideas about cryptography?
That method is farking huge is a fact.
Comment on: Where should I ask for help with my naive ideas about cryptography?
4 GB is farkin' huge. That over 4 billion characters. To do a frequency analysis you'd have to have a bunch of repetitions. Your average message is probably less than a thousand characters.
You could also keep track and not reuse an entry but that's probably overkill.
Comment on: Where should I ask for help with my naive ideas about cryptography?
BTW there is a simple absolutely unbreakable cipher that has been around since forever. Book ciphers.
I wrote a Python version once to learn Python. You make a huge (mine was 4gb) file of random data. Copy it and put it on two computers. To encrypt some text you pick an arbitrary place in the file and search forward from this spot to find an instance of the letter to encrypt (like 'A') . Record the offset is some manner. Continue with the rest of your document and you will end up with a translation of your document to offsets.
Take the file of offsets to the other computer and do the process in reverse (look up the letter at the given offset).
Since there are only two copies of the file in existence the message is absolutely unreadable except by the sender and receiver. There is no form of analysis that can be used to map the offset to a letter since there will be 4,000,000,000,000 (using my 4gb file) different characters representing the 8-bit (one byte) encoded characters. That means approximately 4,000,000,000,000 / 256 symbols representing 'A'. You would be unlikely to ever use the same offset to represent the same letter.
It's absolutely secure but not very flexible.
Comment on: Are you a job title namefag? Programmer vs Developer vs Engineer, etc.
I am a computer scientist.
Because you never hear of 'Mad Engineers' trying to take over the world. It's always a 'Mad Scientist' and I are one.
Comment on: In case youre new to the programming scene, there are numerous approaches to pick your first programming dialect.
Is C++ dead then?
Comment on: Let's play a game! (Instructions inside)
I can laugh at it now but at the time it was a major pain in the ass
Comment on: Let's play a game! (Instructions inside)
Even funner. Take all of your variables and replace them with variables that all are a combination of '1' , 'I', '0', and 'O' (I01 and IO1 are different variables) All of this is done on cards old school. Then remove all the comments. And mess up the formatting.
Then turn the program over to your customer and effectivle go out of business.
That was a PAIN to figure out.
Comment on: Python Programming Basics With Examples
I love what Python can do.
I hate the use of indentation to determine blocks. Bad idea. If the code gets moved it loses cohesion.
Comment on: !WHAT IS THE ROOT PASSWORD OF THE UNIVERSE. I WANT TO GAIN ACCESS TO THE FULL POTENTIAL OF MY FASTER-THAN-LIGHT EQUIPMENT AND QUANTUM PROCESSORS, BUT THE UNIVERSE WON'T LET ME!
'password'
Comment on: I have a laptop I want to install linux on the whole hd and run the existing windows environment in a vm
You might want to thing of dual booting then. You'd still have the original W10 like you have it now so shouldn't be any license problems. Do you understand what dual booting is or should we go into more detail?
Comment on: Are there developer with 34+ years of experience?
I'm at about 35. For my last job interview (many many years ago) I told them two things
1) This will be the last time you see me wearing a suit unless there is a funeral 2) I never want to be in charge of anyone
The job worked well till I had to retire due to illness
Comment on: How important is Algebra in computer programming
Physical simulations needs tons of it.
If you are doing nothing but web stuff prob not
What is you degree in?