Editing Talk:538: Security
Please sign your posts with ~~~~ |
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 5: | Line 5: | ||
[[User:Greyson|Greyson]] ([[User talk:Greyson|talk]]) 02:15, 3 November 2012 (UTC) | [[User:Greyson|Greyson]] ([[User talk:Greyson|talk]]) 02:15, 3 November 2012 (UTC) | ||
− | Remember | + | Remember the other comic, talking about how much does your time spent to pick up a penny cost? This applies here too! It's not just $5 for the wrench, there is also the time of the guy who will be hitting with it! Although of course the wrench is amortizable over multiple secret extraction sessions, unless it gets bent too much out of shape. [[Special:Contributions/108.162.246.5|108.162.246.5]] 20:57, 31 January 2014 (UTC) |
I went to the flea market and bought a $5 wrench, then used it to beat the password out of 2^5 nerds. I just wanted to prove that there is a $5 wrench and that it's reasonable to amortize it over multiple extraction sessions. The wrench is still in good shape, even to use as a wrench. [[Special:Contributions/108.162.215.115|108.162.215.115]] 18:26, 28 January 2015 (UTC) | I went to the flea market and bought a $5 wrench, then used it to beat the password out of 2^5 nerds. I just wanted to prove that there is a $5 wrench and that it's reasonable to amortize it over multiple extraction sessions. The wrench is still in good shape, even to use as a wrench. [[Special:Contributions/108.162.215.115|108.162.215.115]] 18:26, 28 January 2015 (UTC) | ||
Why does everyone imagine that the "crypto nerd" will be a "him"? This gendered language is simply reinforcing the sexist stereotypes that serve as the cultural foundation for rape and other symptoms of this sexist worldview. I'm changing this to "him or her"... {{unsigned|Vctr}} | Why does everyone imagine that the "crypto nerd" will be a "him"? This gendered language is simply reinforcing the sexist stereotypes that serve as the cultural foundation for rape and other symptoms of this sexist worldview. I'm changing this to "him or her"... {{unsigned|Vctr}} | ||
− | + | The text of the comic refers to the cryptonerd being a him. Please check yourself before you wreck yourself. [[Special:Contributions/108.162.221.99|108.162.221.99]] 18:07, 1 May 2015 (UTC) | |
− | + | ||
Same concept as [[416: Zealous Autoconfig]]. [[User:Shanek|Shanek]] ([[User talk:Shanek|talk]]) 12:31, 1 May 2015 (UTC) | Same concept as [[416: Zealous Autoconfig]]. [[User:Shanek|Shanek]] ([[User talk:Shanek|talk]]) 12:31, 1 May 2015 (UTC) | ||
− | |||
What would happen if the owner of the computer used deniable cryptography with some decoy message? -- [[Special:Contributions/173.245.48.141|173.245.48.141]] 08:35, 15 July 2015 (UTC) | What would happen if the owner of the computer used deniable cryptography with some decoy message? -- [[Special:Contributions/173.245.48.141|173.245.48.141]] 08:35, 15 July 2015 (UTC) | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | Surely if he's encrypting his PC, he should be using something like 256-bit AES/Rijndael, which is more secure? | |
− | |||
− |