• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 12:51
CEST 18:51
KST 01:51
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
[ASL21] Ro16 Preview Pt2: All Star10Team Liquid Map Contest #22 - The Finalists16[ASL21] Ro16 Preview Pt1: Fresh Flow9[ASL21] Ro24 Preview Pt2: News Flash10[ASL21] Ro24 Preview Pt1: New Chaos0
Community News
2026 GSL Season 1 Qualifiers19Maestros of the Game 2 announced92026 GSL Tour plans announced15Weekly Cups (April 6-12): herO doubles, "Villains" prevail1MaNa leaves Team Liquid25
StarCraft 2
General
MaNa leaves Team Liquid Maestros of the Game 2 announced 2026 GSL Tour plans announced Team Liquid Map Contest #22 - The Finalists Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool
Tourneys
2026 GSL Season 1 Qualifiers INu's Battles#14 <BO.9 2Matches> Sparkling Tuna Cup - Weekly Open Tournament GSL CK: More events planned pending crowdfunding RSL Revival: Season 5 - Qualifiers and Main Event
Strategy
Custom Maps
[D]RTS in all its shapes and glory <3 [A] Nemrods 1/4 players [M] (2) Frigid Storage
External Content
Mutation # 522 Flip My Base The PondCast: SC2 News & Results Mutation # 521 Memorable Boss Mutation # 520 Moving Fees
Brood War
General
Leta's ASL S21 Ro.16 review BW General Discussion BGH Auto Balance -> http://bghmmr.eu/ Data needed ASL21 General Discussion
Tourneys
Escore Tournament StarCraft Season 2 [Megathread] Daily Proleagues [ASL21] Ro16 Group C [ASL21] Ro16 Group D
Strategy
Simple Questions, Simple Answers What's the deal with APM & what's its true value Any training maps people recommend? Fighting Spirit mining rates
Other Games
General Games
Nintendo Switch Thread Dawn of War IV Diablo IV Total Annihilation Server - TAForever Starcraft Tabletop Miniature Game
Dota 2
The Story of Wings Gaming
League of Legends
G2 just beat GenG in First stand
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
Vanilla Mini Mafia Mafia Game Mode Feedback/Ideas TL Mafia Community Thread Five o'clock TL Mafia
Community
General
US Politics Mega-thread Things Aren’t Peaceful in Palestine Canadian Politics Mega-thread Russo-Ukrainian War Thread YouTube Thread
Fan Clubs
The IdrA Fan Club
Media & Entertainment
[Manga] One Piece Anime Discussion Thread [Req][Books] Good Fantasy/SciFi books Movie Discussion!
Sports
2024 - 2026 Football Thread Formula 1 Discussion McBoner: A hockey love story Cricket [SPORT]
World Cup 2022
Tech Support
Strange computer issues (software) [G] How to Block Livestream Ads
TL Community
The Automated Ban List
Blogs
Sexual Health Of Gamers
TrAiDoS
lurker extra damage testi…
StaticNine
Broowar part 2
qwaykee
Funny Nicknames
LUCKY_NOOB
Iranian anarchists: organize…
XenOsky
Customize Sidebar...

Website Feedback

Closed Threads



Active: 2321 users

US Politics Mega-thread - Page 7071

Forum Index > Closed
Post a Reply
Prev 1 7069 7070 7071 7072 7073 10093 Next
Read the rules in the OP before posting, please.

In order to ensure that this thread continues to meet TL standards and follows the proper guidelines, we will be enforcing the rules in the OP more strictly. Be sure to give them a re-read to refresh your memory! The vast majority of you are contributing in a healthy way, keep it up!

NOTE: When providing a source, explain why you feel it is relevant and what purpose it adds to the discussion if it's not obvious.
Also take note that unsubstantiated tweets/posts meant only to rekindle old arguments can result in a mod action.
LightSpectra
Profile Blog Joined October 2011
United States2524 Posts
Last Edited: 2017-03-07 19:47:58
March 07 2017 19:47 GMT
#141401
On March 08 2017 04:40 ShoCkeyy wrote:
"Reverse engineer the algorithm" right... If you have the algorithm in your hands, there's no need to reverse engineer anything, you've already broke into the database/server...


What do you mean by "algorithm"? If you mean the cryptographic cipher/hash function, then no. There's plenty of those that have no currently known exploit.

https://en.wikipedia.org/wiki/Hash_function_security_summary
https://en.wikipedia.org/wiki/Cipher_security_summary

On March 08 2017 04:41 LegalLord wrote:
Show nested quote +
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
On March 08 2017 04:15 LightSpectra wrote:
I am asking for some proof of the claim "anything connected to the Internet can be hacked".

Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
LegalLord
Profile Blog Joined April 2013
United States13779 Posts
Last Edited: 2017-03-07 19:49:56
March 07 2017 19:49 GMT
#141402
On March 08 2017 04:47 LightSpectra wrote:
Show nested quote +
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
On March 08 2017 04:15 LightSpectra wrote:
I am asking for some proof of the claim "anything connected to the Internet can be hacked".

Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States2524 Posts
March 07 2017 19:54 GMT
#141403
On March 08 2017 04:49 LegalLord wrote:
Show nested quote +
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
On March 08 2017 04:15 LightSpectra wrote:
I am asking for some proof of the claim "anything connected to the Internet can be hacked".

Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
LegalLord
Profile Blog Joined April 2013
United States13779 Posts
March 07 2017 19:58 GMT
#141404
On March 08 2017 04:54 LightSpectra wrote:
Show nested quote +
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
[quote]
Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States2524 Posts
March 07 2017 20:00 GMT
#141405
On March 08 2017 04:58 LegalLord wrote:
Show nested quote +
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
[quote]

Hmmm...

[quote]

Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
Deleted User 3420
Profile Blog Joined May 2003
24492 Posts
March 07 2017 20:12 GMT
#141406
what is the point of what you guys are arguing about again?
LegalLord
Profile Blog Joined April 2013
United States13779 Posts
Last Edited: 2017-03-07 20:18:10
March 07 2017 20:16 GMT
#141407
On March 08 2017 05:00 LightSpectra wrote:
Show nested quote +
On March 08 2017 04:58 LegalLord wrote:
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
[quote]
Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.

Well even the paper you cited wouldn't go nearly as far as to call it "theoretically unhackable" or anything of the sort - it only promises "strong security guarantees" under a set of (fairly reasonable, but far from guaranteed) assumptions such as compiler/assembler/physical correctness. And you even say that it is "theoretically vulnerable."

So if that one isn't "theoretically unhackable" could you point to what context the blockchain is "theoretically invulnerable" in? Even the IBM marketing pages don't make quite so strong a claim. Even among the "we so secure" bluster they have.
History will sooner or later sweep the European Union away without mercy.
LegalLord
Profile Blog Joined April 2013
United States13779 Posts
March 07 2017 20:17 GMT
#141408
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?

At this point? Clarification on his statement that "some systems are not hackable" and what context he means that in.
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States2524 Posts
March 07 2017 20:20 GMT
#141409
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?


The idea that hacking is impossible to deter if you want Internet-based infrastructure.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
Plansix
Profile Blog Joined April 2011
United States60190 Posts
March 07 2017 20:21 GMT
#141410
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?

This is about forcing a professional in a field to admit that a novice is correct when making an overly broad, simplistic claim about intern security. The professional wants to have a more nuanced, specific discussion about security. The novice just wants to make sweeping claims and generalizations.
I have the Honor to be your Obedient Servant, P.6
TL+ Member
Silvanel
Profile Blog Joined March 2003
Poland4751 Posts
March 07 2017 20:23 GMT
#141411
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.
Pathetic Greta hater.
Danglars
Profile Blog Joined August 2010
United States12133 Posts
March 07 2017 20:26 GMT
#141412
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?

LightSpectra trying to prove two people fools on the subject of cybersecurity in wikileaks era (Illustration "Finally, somebody in this thread besides Mohdoo and myself that knows something about cybersecurity.")
To which everything goes to semantics and contexts.
To try to disprove a point what wasn't actually made. ("The idea that hacking is impossible to deter if you want Internet-based infrastructure.")

Show nested quote +
On March 08 2017 02:09 LightSpectra wrote:
On March 08 2017 02:04 RealityIsKing wrote:
Anyone works in IT already know once you are connected to a network, anything is hackable.


Sorry, that's really just not true. I really hope you don't work in IT for anything important.

On March 08 2017 02:04 Plansix wrote:
We have been to soft on wikileaks and unwilling to deal with them head on. We had the ability to assert enough political pressure to deal with them a long time ago, but no one wanted to. Hopefully that will change, because they are not going away.


Is this sarcasm? I would've thought you were a big WikiLeaks proponent.

Great armies come from happy zealots, and happy zealots come from California!
TL+ Member
LightSpectra
Profile Blog Joined October 2011
United States2524 Posts
March 07 2017 20:26 GMT
#141413
On March 08 2017 05:16 LegalLord wrote:
Show nested quote +
On March 08 2017 05:00 LightSpectra wrote:
On March 08 2017 04:58 LegalLord wrote:
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
[quote]

Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.

Well even the paper you cited wouldn't go nearly as far as to call it "theoretically unhackable" or anything of the sort - it only promises "strong security guarantees" under a set of (fairly reasonable, but far from guaranteed) assumptions such as compiler/assembler/physical correctness. And you even say that it is "theoretically vulnerable."

So if that one isn't "theoretically unhackable" could you point to what context the blockchain is "theoretically invulnerable" in? Even the IBM marketing pages don't make quite so strong a claim. Even among the "we so secure" bluster they have.


No, read the abstract from the citation [16]: the software part of seL4 is theoretically invulnerable to any kind of error.

Blockchain is also the same way by design. Read about how it works: https://en.wikipedia.org/wiki/Blockchain_(database)#Description
Due to its decentralized nature, you would have to compromise 51% of the population in order to forge a transaction. Even if you found some exploit in the software, it would have to be simultaneously exploited on 51% of all those with a copy of the database. At that point, you've basically hacked everybody in the entire world, which is beyond all theoretical feasibility until Skynet is real life.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
LightSpectra
Profile Blog Joined October 2011
United States2524 Posts
March 07 2017 20:27 GMT
#141414
On March 08 2017 05:23 Silvanel wrote:
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.


But that's precisely what I'm arguing against. That's actually not the case. There are many possible systems, connected to the Internet, which cannot be hacked in any way; neither by some software exploit, nor by social engineering.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
ShoCkeyy
Profile Blog Joined July 2008
7815 Posts
March 07 2017 20:32 GMT
#141415
Thank goodness Travis CS master programmer is here :D Btw, grats on graduation if I'm getting that correctly.
Life?
Plansix
Profile Blog Joined April 2011
United States60190 Posts
March 07 2017 20:32 GMT
#141416
On March 08 2017 05:27 LightSpectra wrote:
Show nested quote +
On March 08 2017 05:23 Silvanel wrote:
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.


But that's precisely what I'm arguing against. That's actually not the case. There are many possible systems, connected to the Internet, which cannot be hacked in any way; neither by some software exploit, nor by social engineering.

When you say this, you mean that they cannot be completely compromised? That the “hacker” could only gain access to a small part of the system, even through social engineering?
I have the Honor to be your Obedient Servant, P.6
TL+ Member
LegalLord
Profile Blog Joined April 2013
United States13779 Posts
March 07 2017 20:33 GMT
#141417
On March 08 2017 05:26 LightSpectra wrote:
Show nested quote +
On March 08 2017 05:16 LegalLord wrote:
On March 08 2017 05:00 LightSpectra wrote:
On March 08 2017 04:58 LegalLord wrote:
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
[quote]
And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.

Well even the paper you cited wouldn't go nearly as far as to call it "theoretically unhackable" or anything of the sort - it only promises "strong security guarantees" under a set of (fairly reasonable, but far from guaranteed) assumptions such as compiler/assembler/physical correctness. And you even say that it is "theoretically vulnerable."

So if that one isn't "theoretically unhackable" could you point to what context the blockchain is "theoretically invulnerable" in? Even the IBM marketing pages don't make quite so strong a claim. Even among the "we so secure" bluster they have.


No, read the abstract from the citation [16]: the software part of seL4 is theoretically invulnerable to any kind of error.

Blockchain is also the same way by design. Read about how it works: https://en.wikipedia.org/wiki/Blockchain_(database)#Description
Due to its decentralized nature, you would have to compromise 51% of the population in order to forge a transaction. Even if you found some exploit in the software, it would have to be simultaneously exploited on 51% of all those with a copy of the database. At that point, you've basically hacked everybody in the entire world, which is beyond all theoretical feasibility until Skynet is real life.

Complete formal verification is the only known way
to guarantee that a system is free of programming
errors.
We present our experience in performing the for-
mal, machine-checked verification of the seL4 mi-
crokernel from an abstract specification down to its
C implementation. We assume correctness of com-
piler, assembly code, and hardware, and we used a
unique design approach that fuses formal and oper-
ating systems techniques. To our knowledge, this is
the first formal proof of functional correctness of a
complete, general-purpose operating-system kernel.
Functional correctness means here that the implemen-
tation always strictly follows our high-level abstract
specification of kernel behaviour. This encompasses
traditional design and implementation safety proper-
ties such as the kernel will never crash, and it will
never perform an unsafe operation. It also proves
much more: we can predict precisely how the kernel
will behave in every possible situation.
seL4, a third-generation microkernel of L4 prove-
nance, comprises 8,700 lines of C code and 600 lines
of assembler. Its performance is comparable to other
high-performance L4 kernels.


Do explain which part of that makes the statement that you are trying to justify. You are being extremely imprecise with definitions here.

And specifically, what context is blockchain invulnerable in (yes, it has useful features, but what makes it theoretically invulnerable)? You make a statement of "theoretically invulnerable" and say it's "mathematically proven" without providing any of the formal specificity that a mathematical proof would require.
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States2524 Posts
March 07 2017 20:36 GMT
#141418
On March 08 2017 05:32 Plansix wrote:
Show nested quote +
On March 08 2017 05:27 LightSpectra wrote:
On March 08 2017 05:23 Silvanel wrote:
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.


But that's precisely what I'm arguing against. That's actually not the case. There are many possible systems, connected to the Internet, which cannot be hacked in any way; neither by some software exploit, nor by social engineering.

When you say this, you mean that they cannot be completely compromised? That the “hacker” could only gain access to a small part of the system, even through social engineering?


Well, you could always turn off the electricity and shut down the system. But I'm talking about things that are essentially feasible without a blatantly apocalyptic scenario like that.

Like I said before, let's say I have two computers. Their only function is that computer A will transmit over the Internet the word "foobar" and computer B will receive it, every hour. This can be set up in such a way that unless you turn off the electricity or cut the phone lines or convince Comcast to cancel your Internet service (things which we should assume an over-the-Internet hacker cannot), there's no way to stop the transmission, there's no way to alter the transmission, there's no way to broadcast a fake transmission to trick B into thinking it's A, etc.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
Deleted User 3420
Profile Blog Joined May 2003
24492 Posts
March 07 2017 20:39 GMT
#141419
On March 08 2017 05:32 ShoCkeyy wrote:
Thank goodness Travis CS master programmer is here :D Btw, grats on graduation if I'm getting that correctly.


haha no that was an in-thread joke
I won't graduate for a couple years still

as for the discussion I would just make the comment that it doesn't matter if a system is unhackable if it doesn't have practical application
ShoCkeyy
Profile Blog Joined July 2008
7815 Posts
Last Edited: 2017-03-07 20:42:04
March 07 2017 20:41 GMT
#141420
You all seem to forget that Stuxnet existed, which used no internet at all. Came in some of the software/hardware for the Nuclear power plant, and then self started. Not going to deep dive.
Life?
Prev 1 7069 7070 7071 7072 7073 10093 Next
Please log in or register to reply.
Live Events Refresh
uThermal 2v2 Circuit
15:00
Season 2 - Bonus Cup 8
uThermal298
RotterdaM260
mouzHeroMarine257
IndyStarCraft 222
LiquipediaDiscussion
Ladder Legends
15:00
Valedictorian Cup #1
MaxPax vs Krystianer
Solar vs Cham
SteadfastSC79
Liquipedia
PSISTORM Gaming Misc
14:55
FSL s10 Code S FINALS
Freeedom38
Liquipedia
WardiTV Map Contest Tou…
11:00
Playoffs Day 3
MaxPax vs Percival
herO vs Clem
WardiTV1282
IntoTheiNu 332
Rex110
Ryung 109
EnkiAlexander 54
Liquipedia
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
uThermal 298
RotterdaM 260
mouzHeroMarine 257
IndyStarCraft 222
Ryung 112
Rex 110
ProTech107
SteadfastSC 79
BRAT_OK 57
EmSc Tv 15
StarCraft: Brood War
actioN 313
firebathero 232
Hyun 149
Sexy 97
Dewaltoss 97
Pusan 73
Free 59
Sharp 58
ToSsGirL 49
soO 36
[ Show more ]
Rock 33
Noble 25
yabsab 20
IntoTheRainbow 20
Barracks 16
GoRush 13
Terrorterran 12
Dota 2
Gorgc6848
qojqva1756
Counter-Strike
fl0m1949
byalli889
Super Smash Bros
AZ_Axe97
Heroes of the Storm
Khaldor797
Liquid`Hasu413
MindelVK14
Other Games
singsing1757
FrodaN986
Grubby849
B2W.Neo467
Sick310
DeMusliM282
mouzStarbuck274
XBOCT271
QueenE265
KnowMe131
Organizations
Dota 2
PGL Dota 2 - Main Stream19018
StarCraft 2
EmSc Tv 15
EmSc2Tv 15
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
[ Show 19 non-featured ]
StarCraft 2
• Adnapsc2 6
• Dystopia_ 5
• LaughNgamezSOOP
• sooper7s
• AfreecaTV YouTube
• Migwel
• intothetv
• Kozan
• IndyKCrew
StarCraft: Brood War
• Airneanach36
• FirePhoenix3
• Michael_bg 2
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
Dota 2
• WagamamaTV320
League of Legends
• Jankos5076
• TFBlade1287
Other Games
• Shiphtur241
Upcoming Events
BSL
2h 9m
Sparkling Tuna Cup
17h 9m
WardiTV Map Contest Tou…
18h 9m
Ladder Legends
22h 9m
BSL
1d 2h
CranKy Ducklings
1d 7h
Replay Cast
1d 16h
Wardi Open
1d 17h
Afreeca Starleague
1d 17h
Soma vs hero
Monday Night Weeklies
1d 23h
[ Show More ]
Replay Cast
2 days
Replay Cast
2 days
Afreeca Starleague
2 days
Leta vs YSC
Replay Cast
4 days
The PondCast
4 days
KCM Race Survival
4 days
Replay Cast
5 days
Replay Cast
5 days
Escore
5 days
Replay Cast
6 days
Replay Cast
6 days
IPSL
6 days
Ret vs Art_Of_Turtle
Radley vs TBD
Liquipedia Results

Completed

Escore Tournament S2: W4
RSL Revival: Season 4
NationLESS Cup

Ongoing

BSL Season 22
ASL Season 21
CSL 2026 SPRING (S20)
IPSL Spring 2026
KCM Race Survival 2026 Season 2
StarCraft2 Community Team League 2026 Spring
WardiTV TLMC #16
Nations Cup 2026
IEM Rio 2026
PGL Bucharest 2026
Stake Ranked Episode 1
BLAST Open Spring 2026
ESL Pro League S23 Finals
ESL Pro League S23 Stage 1&2
PGL Cluj-Napoca 2026

Upcoming

Escore Tournament S2: W5
Acropolis #4
BSL 22 Non-Korean Championship
CSLAN 4
Kung Fu Cup 2026 Grand Finals
HSC XXIX
uThermal 2v2 2026 Main Event
Maestros of the Game 2
2026 GSL S2
RSL Revival: Season 5
2026 GSL S1
XSE Pro League 2026
IEM Cologne Major 2026
Stake Ranked Episode 2
CS Asia Championships 2026
IEM Atlanta 2026
Asian Champions League 2026
PGL Astana 2026
BLAST Rivals Spring 2026
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2026 TLnet. All Rights Reserved.