amanfromMars 1 Tue 6 Jul 06:25 [2107060625] …… knocking down fences and barriers on

Re: dis-un-de-throne C in the Linux kernel?!

Verity may wish to have words about that ! .… W.S.Gossett

Whenever one has compilations that invoke live testing ACTive runtimes returning <=> there be thrones aplenty turned irrevocably to Rust for SkunkWorX, REST and Greater IntelAIgent Games Play.

Methinks that has C** realised as being more deeply embedded and fused into the foundations concrete of the Linux kernel than would enable them to be viably imagined and declared a pair of separate and separable entities.

Verity may wish to have words about that too for it surely calls upon her expert teasing expertise ‽ .


amanfromMars 1 Tue 6 Jul 09:19 [2107060919] ……. just asking a few pertinent impertinent questions on https://forums.theregister.com/forum/1/2021/07/05/cyber_insurance_report/

Cyber ……. the Gift that just keeps on Giving to Others on the Make and Take?

Insuring against the uninsurable is tantamount to criminal support of a massive institutional fraud, is it not?


amanfromMars 1 Tue 6 Jul 12:02 [2107061202] … helping things along on https://forums.theregister.com/forum/1/2021/07/06/quantum_key_distribution/

Is this what you begin with, or end up with?

In other words, it’s all well and good having a perfected quantum protocol, but if someone can do memory analysis on A or B’s systems, then your “super secure” key can get pwned. “It’s monumentally naive in my view that the companies producing QKD tech don’t take this head on,” Dr Carney concludes. “Hiding behind ‘magic quantum woo-woo security’ is only going to go so far before people start realising.”

That is as may be, however pwnage is absolutely useless until there is any remote attempt to try take unofficial private and/or pirate advantage of quantum key secured information, and then, as is the recognised nature of perfect quantum protocols, will the information and advantage be immediately changed by key quantum communication partners to render the raiders persons of interest to correctional offices/special forces in service of key quantum security requirements.

It is naive in the extreme to not recognise that sort of interference probing QKD tech for undeclared and inequitable advantage as catastrophically self-isolating and highlighting and designedly [by QKD technology buffers] self-destructive.


amanfromMars 1 Tue 6 Jul 16:49 [2107061649] …… revealing more to be both worried and excited about on https://forums.theregister.com/forum/1/2021/07/06/quantum_key_distribution/

Re: “it’s in the implementation where things start to get very sticky”

In theory, theory and practice are the same; in practice, theory and practice are different. ….. Arthur the cat

And such renders to quantum communications practitioners their stealthy secure decidedly unfair and inequitable overwhelming advantage, Arthur the cat.

However, one might like to now know, before there be many proposing to be interested for their own personal selfish gain, It is not a failsafe protocol for everyone whenever only needed for an extremely select few into doing great business with an extremely selective few …. who may or may not be considered chosen and exalted because of what they are purported to be able to do ….. and the emerging evidence would support as being honestly true.

And yes, it’s in the implementation where things start to get very sticky and tricky for many who deserve nothing less and a whole lot more besides, with many not able to survive to experience because of their wilful and wanton sinnings in the past and their encouraging stalwart support for such activities in others.


Leave a Reply

Your email address will not be published. Required fields are marked *