• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EST 01:04
CET 07:04
KST 15:04
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
ByuL: The Forgotten Master of ZvT28Behind the Blue - Team Liquid History Book19Clem wins HomeStory Cup 289HomeStory Cup 28 - Info & Preview13Rongyi Cup S3 - Preview & Info8
Community News
Weekly Cups (Feb 16-22): MaxPax doubles0Weekly Cups (Feb 9-15): herO doubles up2ACS replaced by "ASL Season Open" - Starts 21/0243LiuLi Cup: 2025 Grand Finals (Feb 10-16)46Weekly Cups (Feb 2-8): Classic, Solar, MaxPax win2
StarCraft 2
General
ByuL: The Forgotten Master of ZvT How do you think the 5.0.15 balance patch (Oct 2025) for StarCraft II has affected the game? Oliveira Would Have Returned If EWC Continued Behind the Blue - Team Liquid History Book Weekly Cups (Feb 16-22): MaxPax doubles
Tourneys
StarCraft Evolution League (SC Evo Biweekly) Sea Duckling Open (Global, Bronze-Diamond) PIG STY FESTIVAL 7.0! (19 Feb - 1 Mar) Sparkling Tuna Cup - Weekly Open Tournament How do the "codes" work in GSL?
Strategy
Custom Maps
Map Editor closed ? [A] Starcraft Sound Mod
External Content
Mutation # 514 Ulnar New Year The PondCast: SC2 News & Results Mutation # 513 Attrition Warfare Mutation # 512 Overclocked
Brood War
General
BGH Auto Balance -> http://bghmmr.eu/ ACS replaced by "ASL Season Open" - Starts 21/02 TvZ is the most complete match up CasterMuse Youtube A cwal.gg Extension - Easily keep track of anyone
Tourneys
Escore Tournament StarCraft Season 1 [Megathread] Daily Proleagues [LIVE] [S:21] ASL Season Open Day 1 Small VOD Thread 2.0
Strategy
Fighting Spirit mining rates Simple Questions, Simple Answers Zealot bombing is no longer popular? Current Meta
Other Games
General Games
Path of Exile Nintendo Switch Thread Beyond All Reason Battle Aces/David Kim RTS Megathread New broswer game : STG-World
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
Vanilla Mini Mafia Mafia Game Mode Feedback/Ideas TL Mafia Community Thread
Community
General
US Politics Mega-thread Canadian Politics Mega-thread Mexico's Drug War Russo-Ukrainian War Thread Ask and answer stupid questions here!
Fan Clubs
The IdrA Fan Club The herO Fan Club!
Media & Entertainment
[Req][Books] Good Fantasy/SciFi books [Manga] One Piece Anime Discussion Thread
Sports
2024 - 2026 Football Thread Formula 1 Discussion TL MMA Pick'em Pool 2013
World Cup 2022
Tech Support
TL Community
The Automated Ban List
Blogs
ASL S21 English Commentary…
namkraft
Inside the Communication of …
TrAiDoS
My 2025 Magic: The Gathering…
DARKING
Life Update and thoughts.
FuDDx
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1679 users

US Politics Mega-thread - Page 7071

Forum Index > Closed
Post a Reply
Prev 1 7069 7070 7071 7072 7073 10093 Next
Read the rules in the OP before posting, please.

In order to ensure that this thread continues to meet TL standards and follows the proper guidelines, we will be enforcing the rules in the OP more strictly. Be sure to give them a re-read to refresh your memory! The vast majority of you are contributing in a healthy way, keep it up!

NOTE: When providing a source, explain why you feel it is relevant and what purpose it adds to the discussion if it's not obvious.
Also take note that unsubstantiated tweets/posts meant only to rekindle old arguments can result in a mod action.
LightSpectra
Profile Blog Joined October 2011
United States2161 Posts
Last Edited: 2017-03-07 19:47:58
March 07 2017 19:47 GMT
#141401
On March 08 2017 04:40 ShoCkeyy wrote:
"Reverse engineer the algorithm" right... If you have the algorithm in your hands, there's no need to reverse engineer anything, you've already broke into the database/server...


What do you mean by "algorithm"? If you mean the cryptographic cipher/hash function, then no. There's plenty of those that have no currently known exploit.

https://en.wikipedia.org/wiki/Hash_function_security_summary
https://en.wikipedia.org/wiki/Cipher_security_summary

On March 08 2017 04:41 LegalLord wrote:
Show nested quote +
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
On March 08 2017 04:15 LightSpectra wrote:
I am asking for some proof of the claim "anything connected to the Internet can be hacked".

Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
LegalLord
Profile Blog Joined April 2013
United States13779 Posts
Last Edited: 2017-03-07 19:49:56
March 07 2017 19:49 GMT
#141402
On March 08 2017 04:47 LightSpectra wrote:
Show nested quote +
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
On March 08 2017 04:15 LightSpectra wrote:
I am asking for some proof of the claim "anything connected to the Internet can be hacked".

Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States2161 Posts
March 07 2017 19:54 GMT
#141403
On March 08 2017 04:49 LegalLord wrote:
Show nested quote +
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
On March 08 2017 04:15 LightSpectra wrote:
I am asking for some proof of the claim "anything connected to the Internet can be hacked".

Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
LegalLord
Profile Blog Joined April 2013
United States13779 Posts
March 07 2017 19:58 GMT
#141404
On March 08 2017 04:54 LightSpectra wrote:
Show nested quote +
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
[quote]
Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States2161 Posts
March 07 2017 20:00 GMT
#141405
On March 08 2017 04:58 LegalLord wrote:
Show nested quote +
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
[quote]

Hmmm...

[quote]

Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
Deleted User 3420
Profile Blog Joined May 2003
24492 Posts
March 07 2017 20:12 GMT
#141406
what is the point of what you guys are arguing about again?
LegalLord
Profile Blog Joined April 2013
United States13779 Posts
Last Edited: 2017-03-07 20:18:10
March 07 2017 20:16 GMT
#141407
On March 08 2017 05:00 LightSpectra wrote:
Show nested quote +
On March 08 2017 04:58 LegalLord wrote:
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
[quote]
Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.

Well even the paper you cited wouldn't go nearly as far as to call it "theoretically unhackable" or anything of the sort - it only promises "strong security guarantees" under a set of (fairly reasonable, but far from guaranteed) assumptions such as compiler/assembler/physical correctness. And you even say that it is "theoretically vulnerable."

So if that one isn't "theoretically unhackable" could you point to what context the blockchain is "theoretically invulnerable" in? Even the IBM marketing pages don't make quite so strong a claim. Even among the "we so secure" bluster they have.
History will sooner or later sweep the European Union away without mercy.
LegalLord
Profile Blog Joined April 2013
United States13779 Posts
March 07 2017 20:17 GMT
#141408
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?

At this point? Clarification on his statement that "some systems are not hackable" and what context he means that in.
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States2161 Posts
March 07 2017 20:20 GMT
#141409
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?


The idea that hacking is impossible to deter if you want Internet-based infrastructure.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
Plansix
Profile Blog Joined April 2011
United States60190 Posts
March 07 2017 20:21 GMT
#141410
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?

This is about forcing a professional in a field to admit that a novice is correct when making an overly broad, simplistic claim about intern security. The professional wants to have a more nuanced, specific discussion about security. The novice just wants to make sweeping claims and generalizations.
I have the Honor to be your Obedient Servant, P.6
TL+ Member
Silvanel
Profile Blog Joined March 2003
Poland4742 Posts
March 07 2017 20:23 GMT
#141411
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.
Pathetic Greta hater.
Danglars
Profile Blog Joined August 2010
United States12133 Posts
March 07 2017 20:26 GMT
#141412
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?

LightSpectra trying to prove two people fools on the subject of cybersecurity in wikileaks era (Illustration "Finally, somebody in this thread besides Mohdoo and myself that knows something about cybersecurity.")
To which everything goes to semantics and contexts.
To try to disprove a point what wasn't actually made. ("The idea that hacking is impossible to deter if you want Internet-based infrastructure.")

Show nested quote +
On March 08 2017 02:09 LightSpectra wrote:
On March 08 2017 02:04 RealityIsKing wrote:
Anyone works in IT already know once you are connected to a network, anything is hackable.


Sorry, that's really just not true. I really hope you don't work in IT for anything important.

On March 08 2017 02:04 Plansix wrote:
We have been to soft on wikileaks and unwilling to deal with them head on. We had the ability to assert enough political pressure to deal with them a long time ago, but no one wanted to. Hopefully that will change, because they are not going away.


Is this sarcasm? I would've thought you were a big WikiLeaks proponent.

Great armies come from happy zealots, and happy zealots come from California!
TL+ Member
LightSpectra
Profile Blog Joined October 2011
United States2161 Posts
March 07 2017 20:26 GMT
#141413
On March 08 2017 05:16 LegalLord wrote:
Show nested quote +
On March 08 2017 05:00 LightSpectra wrote:
On March 08 2017 04:58 LegalLord wrote:
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
[quote]

Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.

Well even the paper you cited wouldn't go nearly as far as to call it "theoretically unhackable" or anything of the sort - it only promises "strong security guarantees" under a set of (fairly reasonable, but far from guaranteed) assumptions such as compiler/assembler/physical correctness. And you even say that it is "theoretically vulnerable."

So if that one isn't "theoretically unhackable" could you point to what context the blockchain is "theoretically invulnerable" in? Even the IBM marketing pages don't make quite so strong a claim. Even among the "we so secure" bluster they have.


No, read the abstract from the citation [16]: the software part of seL4 is theoretically invulnerable to any kind of error.

Blockchain is also the same way by design. Read about how it works: https://en.wikipedia.org/wiki/Blockchain_(database)#Description
Due to its decentralized nature, you would have to compromise 51% of the population in order to forge a transaction. Even if you found some exploit in the software, it would have to be simultaneously exploited on 51% of all those with a copy of the database. At that point, you've basically hacked everybody in the entire world, which is beyond all theoretical feasibility until Skynet is real life.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
LightSpectra
Profile Blog Joined October 2011
United States2161 Posts
March 07 2017 20:27 GMT
#141414
On March 08 2017 05:23 Silvanel wrote:
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.


But that's precisely what I'm arguing against. That's actually not the case. There are many possible systems, connected to the Internet, which cannot be hacked in any way; neither by some software exploit, nor by social engineering.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
ShoCkeyy
Profile Blog Joined July 2008
7815 Posts
March 07 2017 20:32 GMT
#141415
Thank goodness Travis CS master programmer is here :D Btw, grats on graduation if I'm getting that correctly.
Life?
Plansix
Profile Blog Joined April 2011
United States60190 Posts
March 07 2017 20:32 GMT
#141416
On March 08 2017 05:27 LightSpectra wrote:
Show nested quote +
On March 08 2017 05:23 Silvanel wrote:
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.


But that's precisely what I'm arguing against. That's actually not the case. There are many possible systems, connected to the Internet, which cannot be hacked in any way; neither by some software exploit, nor by social engineering.

When you say this, you mean that they cannot be completely compromised? That the “hacker” could only gain access to a small part of the system, even through social engineering?
I have the Honor to be your Obedient Servant, P.6
TL+ Member
LegalLord
Profile Blog Joined April 2013
United States13779 Posts
March 07 2017 20:33 GMT
#141417
On March 08 2017 05:26 LightSpectra wrote:
Show nested quote +
On March 08 2017 05:16 LegalLord wrote:
On March 08 2017 05:00 LightSpectra wrote:
On March 08 2017 04:58 LegalLord wrote:
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
[quote]
And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.

Well even the paper you cited wouldn't go nearly as far as to call it "theoretically unhackable" or anything of the sort - it only promises "strong security guarantees" under a set of (fairly reasonable, but far from guaranteed) assumptions such as compiler/assembler/physical correctness. And you even say that it is "theoretically vulnerable."

So if that one isn't "theoretically unhackable" could you point to what context the blockchain is "theoretically invulnerable" in? Even the IBM marketing pages don't make quite so strong a claim. Even among the "we so secure" bluster they have.


No, read the abstract from the citation [16]: the software part of seL4 is theoretically invulnerable to any kind of error.

Blockchain is also the same way by design. Read about how it works: https://en.wikipedia.org/wiki/Blockchain_(database)#Description
Due to its decentralized nature, you would have to compromise 51% of the population in order to forge a transaction. Even if you found some exploit in the software, it would have to be simultaneously exploited on 51% of all those with a copy of the database. At that point, you've basically hacked everybody in the entire world, which is beyond all theoretical feasibility until Skynet is real life.

Complete formal verification is the only known way
to guarantee that a system is free of programming
errors.
We present our experience in performing the for-
mal, machine-checked verification of the seL4 mi-
crokernel from an abstract specification down to its
C implementation. We assume correctness of com-
piler, assembly code, and hardware, and we used a
unique design approach that fuses formal and oper-
ating systems techniques. To our knowledge, this is
the first formal proof of functional correctness of a
complete, general-purpose operating-system kernel.
Functional correctness means here that the implemen-
tation always strictly follows our high-level abstract
specification of kernel behaviour. This encompasses
traditional design and implementation safety proper-
ties such as the kernel will never crash, and it will
never perform an unsafe operation. It also proves
much more: we can predict precisely how the kernel
will behave in every possible situation.
seL4, a third-generation microkernel of L4 prove-
nance, comprises 8,700 lines of C code and 600 lines
of assembler. Its performance is comparable to other
high-performance L4 kernels.


Do explain which part of that makes the statement that you are trying to justify. You are being extremely imprecise with definitions here.

And specifically, what context is blockchain invulnerable in (yes, it has useful features, but what makes it theoretically invulnerable)? You make a statement of "theoretically invulnerable" and say it's "mathematically proven" without providing any of the formal specificity that a mathematical proof would require.
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States2161 Posts
March 07 2017 20:36 GMT
#141418
On March 08 2017 05:32 Plansix wrote:
Show nested quote +
On March 08 2017 05:27 LightSpectra wrote:
On March 08 2017 05:23 Silvanel wrote:
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.


But that's precisely what I'm arguing against. That's actually not the case. There are many possible systems, connected to the Internet, which cannot be hacked in any way; neither by some software exploit, nor by social engineering.

When you say this, you mean that they cannot be completely compromised? That the “hacker” could only gain access to a small part of the system, even through social engineering?


Well, you could always turn off the electricity and shut down the system. But I'm talking about things that are essentially feasible without a blatantly apocalyptic scenario like that.

Like I said before, let's say I have two computers. Their only function is that computer A will transmit over the Internet the word "foobar" and computer B will receive it, every hour. This can be set up in such a way that unless you turn off the electricity or cut the phone lines or convince Comcast to cancel your Internet service (things which we should assume an over-the-Internet hacker cannot), there's no way to stop the transmission, there's no way to alter the transmission, there's no way to broadcast a fake transmission to trick B into thinking it's A, etc.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
Deleted User 3420
Profile Blog Joined May 2003
24492 Posts
March 07 2017 20:39 GMT
#141419
On March 08 2017 05:32 ShoCkeyy wrote:
Thank goodness Travis CS master programmer is here :D Btw, grats on graduation if I'm getting that correctly.


haha no that was an in-thread joke
I won't graduate for a couple years still

as for the discussion I would just make the comment that it doesn't matter if a system is unhackable if it doesn't have practical application
ShoCkeyy
Profile Blog Joined July 2008
7815 Posts
Last Edited: 2017-03-07 20:42:04
March 07 2017 20:41 GMT
#141420
You all seem to forget that Stuxnet existed, which used no internet at all. Came in some of the software/hardware for the Nuclear power plant, and then self started. Not going to deep dive.
Life?
Prev 1 7069 7070 7071 7072 7073 10093 Next
Please log in or register to reply.
Live Events Refresh
Next event in 2h 56m
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
Nina 247
mcanning 110
StarCraft: Brood War
GuemChi 2168
Tasteless 221
Snow 146
Dewaltoss 24
Icarus 12
NaDa 11
Dota 2
febbydoto17
Counter-Strike
Coldzera 1742
Stewie2K737
m0e_tv364
Other Games
summit1g9767
WinterStarcraft381
C9.Mang0287
RuFF_SC2100
Mew2King23
Organizations
Other Games
gamesdonequick1522
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 12 non-featured ]
StarCraft 2
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
League of Legends
• Rush1268
• Stunt528
Upcoming Events
CasterMuse Showmatch
2h 56m
Light vs Queen
WardiTV Winter Champion…
5h 56m
OSC
17h 56m
The PondCast
1d 3h
Replay Cast
1d 17h
Korean StarCraft League
2 days
CranKy Ducklings
3 days
SC Evo Complete
3 days
Replay Cast
3 days
Sparkling Tuna Cup
4 days
[ Show More ]
uThermal 2v2 Circuit
4 days
Replay Cast
5 days
Wardi Open
5 days
Replay Cast
5 days
Liquipedia Results

Completed

Proleague 2026-02-22
LiuLi Cup: 2025 Grand Finals
Underdog Cup #3

Ongoing

KCM Race Survival 2026 Season 1
Acropolis #4 - TS5
Jeongseon Sooper Cup
Spring Cup 2026
WardiTV Winter 2026
PiG Sty Festival 7.0
Nations Cup 2026
PGL Cluj-Napoca 2026
IEM Kraków 2026
BLAST Bounty Winter 2026
BLAST Bounty Winter Qual
eXTREMESLAND 2025
SL Budapest Major 2025

Upcoming

[S:21] ASL SEASON OPEN 2nd Round
[S:21] ASL SEASON OPEN 2nd Round Qualifier
ASL Season 21: Qualifier #1
Acropolis #4 - TS6
Acropolis #4
IPSL Spring 2026
CSLAN 4
HSC XXIX
uThermal 2v2 2026 Main Event
Bellum Gens Elite Stara Zagora 2026
RSL Revival: Season 4
PGL Astana 2026
BLAST Rivals Spring 2026
CCT Season 3 Global Finals
FISSURE Playground #3
IEM Rio 2026
PGL Bucharest 2026
Stake Ranked Episode 1
BLAST Open Spring 2026
ESL Pro League S23 Finals
ESL Pro League S23 Stage 1&2
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2026 TLnet. All Rights Reserved.