• 0 Posts
  • 59 Comments
Joined 1 year ago
cake
Cake day: September 5th, 2023

help-circle








  • But can you detect the link being broken by someone other than your intended communication partner?

    If A sends a particle to B, couldn’t M intercept A’s particle and send a different particle to B? Kind of like intercepting Diffie Hellman. A and B will both share some information with M, but not with each other.


  • Opisek@lemmy.worldtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    8
    ·
    edit-2
    1 month ago

    So they’ve shown they can send light over a cable designed to transfer light.

    The impressive thing is of course managing to get one specific photon to one specific location. Still, what benefits does that have over the standard encoding?

    I guess this technique might have a lower error rate and higher distance, because it’s binary by nature with no quantization needed. But you don’t need the quantum entanglement part at all for this.

    Edit: Reading is hard! This is indeed exciting for security. I wonder how it fairs against a very powerful MitM though.





  • Opisek@lemmy.worldtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    edit-2
    4 months ago

    Wearing a seatbelt in a moving vehicle does not magically prevent all deaths upon an accident. Do you recommend we should stop wearing seatbelts?

    If there are measures in place that reduce the danger of something happening, it’s not wise to remove them just because they’re not 100% effective.







  • Opisek@lemmy.worldtoSelfhosted@lemmy.worldPaid SSL vs Letsencrypt
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    5 months ago

    OP’s security concern is valid. Different CAs may differ in the challenges used to verify you to be the domain owner. Using something that you could crack may lead to an attacker’s public key being certified instead.

    This could for example be the case with HTTPS verification (place a file with a specific content accessible through your URL) if the website has lacking input sanitization and/or creates files with the user’s input at an unfortunate location that collides with the challenge.

    This attack vector might be far-fetched, but there can certainly be differences between different signing authorities.