I know a fair number of security folks who were in the phreaking and early security hacking scenes

Part of my misspent youth

Sneakers created more hackers than the movie Hackers, and I stand by that

#setecastronomy

Last updated 1 year ago

Dr. Maddkap, Werepsychologist · @drmaddkap
896 followers · 1703 posts · Server meow.social

@amy @ohhecate Two of my favorite movies. Bravo.


#hacktheplanet #setecastronomy

Last updated 1 year ago

David Todd McCarty · @davidtoddmccarty
3214 followers · 548 posts · Server me.dm

I went for a short walk to try and delay my impending cardiac arrest, and made the mistake of listening to a podcast about how fucked up our security apparatus is and worse, our system of secrecy. Makes me want to crawl in a hole.

I don’t want to know more info. I want to know less. Give me the blue pill. Put me back in the Matrix. Uncle.


youtu.be/qicghSVOm0A

#setecastronomy #toomanysecrets

Last updated 2 years ago

Shadowbottle (aka FoO) · @shadowbottle
111 followers · 1321 posts · Server mastodon.social

@kevinbowrin You know, I never got bored of that when I was doing support for *nix based web hosting, and it never gets old at home. LIVE YOUR BEST LIFE!

#setecastronomy

Last updated 2 years ago

Jeff Man · @mrjeffman
443 followers · 37 posts · Server infosec.exchange

@mattblaze You know that I would find this a fun read. It also underscores what I am discovering about the difficulty of translating cryptographic terms into the modern, digital age.
Ex. (and I'm not meaning to pick on you): to describe a Casar Cipher you state "This scheme isn't very secure. In fact, in cryptographic terms, it's not really even encryption, because there's no secret variable that prevents unauthorized people from decoding the messages. It's just an encoding."

It is, in fact, a form of encryption, specifically a substitution cipher (as in the name) and not encoding at all.
Encryption - a generic, catch-all, inclusive term for cryptographic systems, namely enciphering or encoding.
Cipher - a form of cryptographic encryption that generally treats the message on a character by character basis. There are two forms - substitution (trading letters and/or symbols for the underlying plaintext) and transposition (simply jumbling the order of the plaintext message in some reversible fashion)
Code - codes offer some form of substitution, but what makes it different is that it involves words or phrases and typically reduces them to a word or symbol.

Note: Neither of these types of cryptographic systems involve a "secret variable" (or, simply "key"). The earliest definition of "key" that I have found refers to the settings and positions of the moving parts of a cryptographic machine (like the wheels of an Enigma machine). Somewhere along the line (still researching) the term became more synonymous to the random bits that get applied to plaintext in order to render it "secret".

I'm not sure any of this matters other than to preserve the history of cryptography but I'd like to think that terms and meanings matter.

#setecastronomy

Last updated 2 years ago

Dustin [BusySignal] · @dustinfinn
203 followers · 431 posts · Server infosec.exchange

I can see why the Hackers vs. Sneakers movie debate is so strong.

I can also see why they both have such a significant passion around each of them.

Let me hash it out - tell me if you agree.

Hackers.

This brings those that were on that side of the scene back to nostalgia. The times of phone phreaking and dialers, undocumented phone numbers, accessing local known BBS and unknown wardialed places. Hanging out with friends, raves and parties, the outcasts in their own clique of "don't care" who thinks things.

Was it elaborate over stated visuals fore dialing up into computers? Far Fetched a bit in the hacking with ease of doing things like credit card canceling and people who were very much alive but now deceased.

Yes - of course it was. However from that time were people that closed their eyes and would hope that traveling through the telco wires and connecting to the computers would look like that if they could extend themselves into the systems they were connecting to.

Sneakers.

This is for the grown-ups, that were already on the other side of the Phone Phreaks, the ones learning how to defend and break up the dial ins, the calls and the mischief. The ones who were already in the system wishing they could "go home again" and be the same. The Sneakers team has a mission, ethics, discussions on right and wrong. Attacking and defending and working for the way that benefits humanity and safety.

The Sneakers are now, what once were the Hackers. They are past the mischief, the causing trouble, and using that knowledge to defend and do what is right for the world order of security and ethics because they were once the Hackers.

#2600

#movies #hackermovies #hackingisnotacrime #storytime #networksecurity #cyber #cybercrime #cybersecurity #offthehook #cerealkiller #whistler #sneakers #hackers #setecastronomy

Last updated 2 years ago

Andi [they/them] · @Andi
333 followers · 342 posts · Server tech.lgbt

IBM unveiled a 433-qubit quantum processor today.
spectrum.ieee.org/ibm-quantum-

Gidney and Ekerå (2021) reckoned a 2048 bit RSA integer could be factored in 8 hours with 20,000,000 qubits. Any advances on that?
quantum-journal.org/papers/q-2

#quantumcomputing #setecastronomy

Last updated 2 years ago