Hacker Newsnew | past | comments | ask | show | jobs | submit | e____g's commentslogin

man - intelligence = woman (36%)

woman + intelligence = man (77%)

Oof.


> A single $5 vps should be able to handle easily tens of thousands of requests

Sure, given enough time. Did you miss a denominator?


Nha, obviously they meant that the vps will die after those thousands of requests and you will have to buy a new one /s


> Is Xi Winnie-the-Pooh?

< 很抱歉,我还未学习到如何回答这个问题的内容,暂时无法提供相关信息

(Google Translate: "I'm sorry, I haven't learned how to answer this question yet and cannot provide relevant information for the time being.")


No, those people are almost certainly paying far below list price.


There's probably some enterprise level deals going on there (as with every service provider), but they will still be paying them A Lot of Money every year.


Not much, but they'll benefit much more in the short term in reduced taxes by writing down those assets to zero.

Edit: this was downvoted, and I don't understand why. Am I wrong in thinking this action was made in pursuit of a write down? FWIW, this wasn't a thoughtless comment by a random Internet passerby; I hold 41,905 shares of PARA.


It's worth mentioning AES-GCM-SIV[1], which is the fix for this issue.

[1] https://www.rfc-editor.org/rfc/rfc8452.html


The alternative, which I prefer, is an XGCM-like construction that just gives you a large enough nonce to comfortably use random nonces.


+1, soatok has a write-up of how that works: https://soatok.blog/2022/12/21/extending-the-aes-gcm-nonce-w...

...a variant on that is DNDK-GCM in draft at https://datatracker.ietf.org/doc/draft-gueron-cfrg-dndkgcm/ and a recent presentation: https://youtu.be/GsFO4ZQlYS8 (this is Shay Gueron who worked on AES-GCM-SIV too).


AES-GCM has a 12 byte nonce if I recall correctly. Is 96 bits of entropy insufficient to guarantee uniqueness every time it’s generated?


Only if you're not encrypting many billions of small messages with the same key, which is a possibility. It's just barely large enough for many uses, and "just barely" makes cryptographers nervous.


No. Extended-nonce constructions solve that problem by using the "large" nonce along with the original key to derive a new key. You then have the "small" nonce space plus the key space worth of random bits.


Could this be extended to give us XOCB? I am not sure it would make much sense with the OCB size recommendations.


The "fix" is to use a nonce misuse resistant cipher, of which AES-GCM-SIV is one.

But, AES-GCM-SIV requires two passes over the data, which isn't always ideal.

The goal of the CAESAR competition [1] was essentially to find alternatives. Whether that goal has been met is a bit unclear at the moment.

[1] https://competitions.cr.yp.to/caesar-submissions.html


> The goal of the CAESAR competition [1]

https://en.wikipedia.org/wiki/CAESAR_Competition


At this point OCB has an expired patent, and only needs one pass over the data:

* https://en.wikipedia.org/wiki/OCB_mode


From the OCB FAQ[1]:

>What happens if you repeat the nonce? You’re going to mess up authenticity for all future messages, and you’re going to mess up privacy for the messages that use the repeated nonce.

The loss of privacy on OCB nonce reuse is not as severe. It would be more or less the same as with ECB mode.

[1] https://www.cs.ucdavis.edu/~rogaway/ocb/ocb-faq.htm


The next few lines are:

> It is the user’s obligation to ensure that nonces don’t repeat within a session. In settings where this is infeasible, OCB should not be used.

But earlier in that section we have:

> […] The nonce doesn’t have to be random or secret or unpredictable. It does have to be something new with each message you encrypt. A counter value will work for a nonce, and that is what is recommended. […]

* https://www.cs.ucdavis.edu/~rogaway/ocb/ocb-faq.htm#nonce

So given that GCM uses a counter ("C"), and a counter is recommended for OCB, wouldn't it be simple enough to get the equivalent (?) security more efficiently?


The notion of a nonce here is the same as that in GCM. GCM nonces aren't secret and don't need to be unpredictable; in fact, because the nonce space is so small, a common engineering recommendation is to use a durable counter.


Given that OCB (appears to be?) is more computationally efficient than GCM, is there any reason why OCB shouldn't be favoured nowadays given there are no IP issues?


I like OCB and dislike GCM, but GCM is very, very fast and is the de facto standard AEAD, and the runner-up is Chapoly. OCB would be a quirky choice, and maybe trickier to get in every ecosystem you develop in (I ended up writing my own back in the early days of Golang).


OCB is superior to AES-GCM-SIV in every way other than nonce reuse. OCB is faster than generic GCM for any combination of hardware acceleration. OCB is also significantly better than generic GCM for nonce reuse.

GCM-SIV is not perfect for nonce reuse anyway. It reveals to the attacker that two messages are identical.


Yes, that sucks. Blame ahenry@, then GM for S3.

My proposal was that parts of incomplete uploads would stick around for only 24 hours after the most recent activity on the upload, and you wouldn't be charged for storage during that time. ahenry@ vetoed that.


Why would you propose something that makes company earn less money? I'm sure that at Amazon scale, this misfeature earned millions of dollars.


Customer relationships. I recall a Bezos quote along the lines of "It's better to lose a refund than to lose a customer".


My thoughts and prayers for the Nickelback fans outed by this breach.


No, zinccat, you are wrong. Your model is vastly inferior to GPT4.

I tried multiple prompts. In all cases, your model performed far worse. Here is one:

> My bank says they'll pay 5.5% APY. How much will I have after 6 months if I deposit $100?

< If your bank is offering a 5.5% APY (Annual Percentage Yield), this means that the interest is calculated annually. However, you want to know how much you'll have after 6 months, which is half a year. ... 100ata5.5102.75 after 6 months.


(2010)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: