• 0 Posts
  • 25 Comments
Joined 1 year ago
cake
Cake day: June 10th, 2023

help-circle

  • Ownership in general isn’t some fundamental inalienable right. It’s just that if you let people own things, you give them more incentive to make things. I think intellectual property rights are far too extensive, but if we didn’t have them at all, how would we pay for R&D? How would we pay for big budget games and movies? Maybe you’re happy contributing to openly licensed projects, but a lot of people have to pay for rent and raise a family, and can’t take the time to contribute to things like that even if they want to unless they have the money to support themselves.


















  • Archpawn@lemmy.worldtoTechnology@lemmy.worldPasswords
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    If I’m typing on a computer keyboard, typing words is easier than random letters, but on a phone it doesn’t make much of a difference. What I end up doing is typing my passphrase into my password manager on the computer, and then typing the password on there into my phone.

    I do have a password manager app for my phone, but then I have to type the whole passphrase into it so I don’t use it unless necessary.


  • Archpawn@lemmy.worldtoTechnology@lemmy.worldPasswords
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Some of them are broken by quantum computers, but not all of them. For example, SHA256. You can use Grover’s algorithm to take sqrt(n) steps to check n possible passwords, which on the one hand means it can be billions of times faster, but on the other hand, you just need to double the length of the password to get the same security vs quantum computers. Also, this is the first I’ve heard of a hash that uses a quantum computer. Do you have a source? Hashes need to be deterministic, and quantum computers aren’t, so that doesn’t seem like it would work very well.

    Maybe you’re getting mixed up with using quantum encryption to get around quantum computers breaking common encryption algorithms?