• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EST 00:01
CET 06:01
KST 14:01
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
RSL Season 3 - Playoffs Preview0RSL Season 3 - RO16 Groups C & D Preview0RSL Season 3 - RO16 Groups A & B Preview2TL.net Map Contest #21: Winners12Intel X Team Liquid Seoul event: Showmatches and Meet the Pros10
Community News
RSL Season 3: RO16 results & RO8 bracket13Weekly Cups (Nov 10-16): Reynor, Solar lead Zerg surge2[TLMC] Fall/Winter 2025 Ladder Map Rotation14Weekly Cups (Nov 3-9): Clem Conquers in Canada4SC: Evo Complete - Ranked Ladder OPEN ALPHA16
StarCraft 2
General
SC: Evo Complete - Ranked Ladder OPEN ALPHA Weekly Cups (Nov 10-16): Reynor, Solar lead Zerg surge RSL Season 3: RO16 results & RO8 bracket RSL Season 3 - Playoffs Preview Mech is the composition that needs teleportation t
Tourneys
RSL Revival: Season 3 $5,000+ WardiTV 2025 Championship StarCraft Evolution League (SC Evo Biweekly) Constellation Cup - Main Event - Stellar Fest 2025 RSL Offline Finals Dates + Ticket Sales!
Strategy
Custom Maps
Map Editor closed ?
External Content
Mutation # 501 Price of Progress Mutation # 500 Fright night Mutation # 499 Chilling Adaptation Mutation # 498 Wheel of Misfortune|Cradle of Death
Brood War
General
Data analysis on 70 million replays 2v2 maps which are SC2 style with teams together? BGH Auto Balance -> http://bghmmr.eu/ soO on: FanTaSy's Potential Return to StarCraft A cwal.gg Extension - Easily keep track of anyone
Tourneys
[BSL21] RO16 Tie Breaker - Group B - Sun 21:00 CET [BSL21] RO16 Tie Breaker - Group A - Sat 21:00 CET [Megathread] Daily Proleagues Small VOD Thread 2.0
Strategy
Current Meta Game Theory for Starcraft How to stay on top of macro? PvZ map balance
Other Games
General Games
Path of Exile Nintendo Switch Thread Should offensive tower rushing be viable in RTS games? Clair Obscur - Expedition 33 Stormgate/Frost Giant Megathread
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
Mafia Game Mode Feedback/Ideas
Community
General
Russo-Ukrainian War Thread US Politics Mega-thread The Games Industry And ATVI Things Aren’t Peaceful in Palestine About SC2SEA.COM
Fan Clubs
White-Ra Fan Club The herO Fan Club!
Media & Entertainment
[Manga] One Piece Movie Discussion! Anime Discussion Thread Korean Music Discussion
Sports
Formula 1 Discussion 2024 - 2026 Football Thread NBA General Discussion MLB/Baseball 2023 TeamLiquid Health and Fitness Initiative For 2023
World Cup 2022
Tech Support
TL Community
The Automated Ban List
Blogs
The Health Impact of Joining…
TrAiDoS
Dyadica Evangelium — Chapt…
Hildegard
Saturation point
Uldridge
DnB/metal remix FFO Mick Go…
ImbaTosS
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1518 users

US Politics Mega-thread - Page 7071

Forum Index > Closed
Post a Reply
Prev 1 7069 7070 7071 7072 7073 10093 Next
Read the rules in the OP before posting, please.

In order to ensure that this thread continues to meet TL standards and follows the proper guidelines, we will be enforcing the rules in the OP more strictly. Be sure to give them a re-read to refresh your memory! The vast majority of you are contributing in a healthy way, keep it up!

NOTE: When providing a source, explain why you feel it is relevant and what purpose it adds to the discussion if it's not obvious.
Also take note that unsubstantiated tweets/posts meant only to rekindle old arguments can result in a mod action.
LightSpectra
Profile Blog Joined October 2011
United States1890 Posts
Last Edited: 2017-03-07 19:47:58
March 07 2017 19:47 GMT
#141401
On March 08 2017 04:40 ShoCkeyy wrote:
"Reverse engineer the algorithm" right... If you have the algorithm in your hands, there's no need to reverse engineer anything, you've already broke into the database/server...


What do you mean by "algorithm"? If you mean the cryptographic cipher/hash function, then no. There's plenty of those that have no currently known exploit.

https://en.wikipedia.org/wiki/Hash_function_security_summary
https://en.wikipedia.org/wiki/Cipher_security_summary

On March 08 2017 04:41 LegalLord wrote:
Show nested quote +
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
On March 08 2017 04:15 LightSpectra wrote:
I am asking for some proof of the claim "anything connected to the Internet can be hacked".

Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
LegalLord
Profile Blog Joined April 2013
United States13779 Posts
Last Edited: 2017-03-07 19:49:56
March 07 2017 19:49 GMT
#141402
On March 08 2017 04:47 LightSpectra wrote:
Show nested quote +
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
On March 08 2017 04:15 LightSpectra wrote:
I am asking for some proof of the claim "anything connected to the Internet can be hacked".

Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States1890 Posts
March 07 2017 19:54 GMT
#141403
On March 08 2017 04:49 LegalLord wrote:
Show nested quote +
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
On March 08 2017 04:15 LightSpectra wrote:
I am asking for some proof of the claim "anything connected to the Internet can be hacked".

Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
LegalLord
Profile Blog Joined April 2013
United States13779 Posts
March 07 2017 19:58 GMT
#141404
On March 08 2017 04:54 LightSpectra wrote:
Show nested quote +
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
[quote]
Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States1890 Posts
March 07 2017 20:00 GMT
#141405
On March 08 2017 04:58 LegalLord wrote:
Show nested quote +
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
[quote]

Hmmm...

[quote]

Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
Deleted User 3420
Profile Blog Joined May 2003
24492 Posts
March 07 2017 20:12 GMT
#141406
what is the point of what you guys are arguing about again?
LegalLord
Profile Blog Joined April 2013
United States13779 Posts
Last Edited: 2017-03-07 20:18:10
March 07 2017 20:16 GMT
#141407
On March 08 2017 05:00 LightSpectra wrote:
Show nested quote +
On March 08 2017 04:58 LegalLord wrote:
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
[quote]
Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.

Well even the paper you cited wouldn't go nearly as far as to call it "theoretically unhackable" or anything of the sort - it only promises "strong security guarantees" under a set of (fairly reasonable, but far from guaranteed) assumptions such as compiler/assembler/physical correctness. And you even say that it is "theoretically vulnerable."

So if that one isn't "theoretically unhackable" could you point to what context the blockchain is "theoretically invulnerable" in? Even the IBM marketing pages don't make quite so strong a claim. Even among the "we so secure" bluster they have.
History will sooner or later sweep the European Union away without mercy.
LegalLord
Profile Blog Joined April 2013
United States13779 Posts
March 07 2017 20:17 GMT
#141408
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?

At this point? Clarification on his statement that "some systems are not hackable" and what context he means that in.
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States1890 Posts
March 07 2017 20:20 GMT
#141409
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?


The idea that hacking is impossible to deter if you want Internet-based infrastructure.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
Plansix
Profile Blog Joined April 2011
United States60190 Posts
March 07 2017 20:21 GMT
#141410
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?

This is about forcing a professional in a field to admit that a novice is correct when making an overly broad, simplistic claim about intern security. The professional wants to have a more nuanced, specific discussion about security. The novice just wants to make sweeping claims and generalizations.
I have the Honor to be your Obedient Servant, P.6
TL+ Member
Silvanel
Profile Blog Joined March 2003
Poland4733 Posts
March 07 2017 20:23 GMT
#141411
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.
Pathetic Greta hater.
Danglars
Profile Blog Joined August 2010
United States12133 Posts
March 07 2017 20:26 GMT
#141412
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?

LightSpectra trying to prove two people fools on the subject of cybersecurity in wikileaks era (Illustration "Finally, somebody in this thread besides Mohdoo and myself that knows something about cybersecurity.")
To which everything goes to semantics and contexts.
To try to disprove a point what wasn't actually made. ("The idea that hacking is impossible to deter if you want Internet-based infrastructure.")

Show nested quote +
On March 08 2017 02:09 LightSpectra wrote:
On March 08 2017 02:04 RealityIsKing wrote:
Anyone works in IT already know once you are connected to a network, anything is hackable.


Sorry, that's really just not true. I really hope you don't work in IT for anything important.

On March 08 2017 02:04 Plansix wrote:
We have been to soft on wikileaks and unwilling to deal with them head on. We had the ability to assert enough political pressure to deal with them a long time ago, but no one wanted to. Hopefully that will change, because they are not going away.


Is this sarcasm? I would've thought you were a big WikiLeaks proponent.

Great armies come from happy zealots, and happy zealots come from California!
TL+ Member
LightSpectra
Profile Blog Joined October 2011
United States1890 Posts
March 07 2017 20:26 GMT
#141413
On March 08 2017 05:16 LegalLord wrote:
Show nested quote +
On March 08 2017 05:00 LightSpectra wrote:
On March 08 2017 04:58 LegalLord wrote:
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
[quote]

Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.

Well even the paper you cited wouldn't go nearly as far as to call it "theoretically unhackable" or anything of the sort - it only promises "strong security guarantees" under a set of (fairly reasonable, but far from guaranteed) assumptions such as compiler/assembler/physical correctness. And you even say that it is "theoretically vulnerable."

So if that one isn't "theoretically unhackable" could you point to what context the blockchain is "theoretically invulnerable" in? Even the IBM marketing pages don't make quite so strong a claim. Even among the "we so secure" bluster they have.


No, read the abstract from the citation [16]: the software part of seL4 is theoretically invulnerable to any kind of error.

Blockchain is also the same way by design. Read about how it works: https://en.wikipedia.org/wiki/Blockchain_(database)#Description
Due to its decentralized nature, you would have to compromise 51% of the population in order to forge a transaction. Even if you found some exploit in the software, it would have to be simultaneously exploited on 51% of all those with a copy of the database. At that point, you've basically hacked everybody in the entire world, which is beyond all theoretical feasibility until Skynet is real life.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
LightSpectra
Profile Blog Joined October 2011
United States1890 Posts
March 07 2017 20:27 GMT
#141414
On March 08 2017 05:23 Silvanel wrote:
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.


But that's precisely what I'm arguing against. That's actually not the case. There are many possible systems, connected to the Internet, which cannot be hacked in any way; neither by some software exploit, nor by social engineering.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
ShoCkeyy
Profile Blog Joined July 2008
7815 Posts
March 07 2017 20:32 GMT
#141415
Thank goodness Travis CS master programmer is here :D Btw, grats on graduation if I'm getting that correctly.
Life?
Plansix
Profile Blog Joined April 2011
United States60190 Posts
March 07 2017 20:32 GMT
#141416
On March 08 2017 05:27 LightSpectra wrote:
Show nested quote +
On March 08 2017 05:23 Silvanel wrote:
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.


But that's precisely what I'm arguing against. That's actually not the case. There are many possible systems, connected to the Internet, which cannot be hacked in any way; neither by some software exploit, nor by social engineering.

When you say this, you mean that they cannot be completely compromised? That the “hacker” could only gain access to a small part of the system, even through social engineering?
I have the Honor to be your Obedient Servant, P.6
TL+ Member
LegalLord
Profile Blog Joined April 2013
United States13779 Posts
March 07 2017 20:33 GMT
#141417
On March 08 2017 05:26 LightSpectra wrote:
Show nested quote +
On March 08 2017 05:16 LegalLord wrote:
On March 08 2017 05:00 LightSpectra wrote:
On March 08 2017 04:58 LegalLord wrote:
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
[quote]
And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.

Well even the paper you cited wouldn't go nearly as far as to call it "theoretically unhackable" or anything of the sort - it only promises "strong security guarantees" under a set of (fairly reasonable, but far from guaranteed) assumptions such as compiler/assembler/physical correctness. And you even say that it is "theoretically vulnerable."

So if that one isn't "theoretically unhackable" could you point to what context the blockchain is "theoretically invulnerable" in? Even the IBM marketing pages don't make quite so strong a claim. Even among the "we so secure" bluster they have.


No, read the abstract from the citation [16]: the software part of seL4 is theoretically invulnerable to any kind of error.

Blockchain is also the same way by design. Read about how it works: https://en.wikipedia.org/wiki/Blockchain_(database)#Description
Due to its decentralized nature, you would have to compromise 51% of the population in order to forge a transaction. Even if you found some exploit in the software, it would have to be simultaneously exploited on 51% of all those with a copy of the database. At that point, you've basically hacked everybody in the entire world, which is beyond all theoretical feasibility until Skynet is real life.

Complete formal verification is the only known way
to guarantee that a system is free of programming
errors.
We present our experience in performing the for-
mal, machine-checked verification of the seL4 mi-
crokernel from an abstract specification down to its
C implementation. We assume correctness of com-
piler, assembly code, and hardware, and we used a
unique design approach that fuses formal and oper-
ating systems techniques. To our knowledge, this is
the first formal proof of functional correctness of a
complete, general-purpose operating-system kernel.
Functional correctness means here that the implemen-
tation always strictly follows our high-level abstract
specification of kernel behaviour. This encompasses
traditional design and implementation safety proper-
ties such as the kernel will never crash, and it will
never perform an unsafe operation. It also proves
much more: we can predict precisely how the kernel
will behave in every possible situation.
seL4, a third-generation microkernel of L4 prove-
nance, comprises 8,700 lines of C code and 600 lines
of assembler. Its performance is comparable to other
high-performance L4 kernels.


Do explain which part of that makes the statement that you are trying to justify. You are being extremely imprecise with definitions here.

And specifically, what context is blockchain invulnerable in (yes, it has useful features, but what makes it theoretically invulnerable)? You make a statement of "theoretically invulnerable" and say it's "mathematically proven" without providing any of the formal specificity that a mathematical proof would require.
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States1890 Posts
March 07 2017 20:36 GMT
#141418
On March 08 2017 05:32 Plansix wrote:
Show nested quote +
On March 08 2017 05:27 LightSpectra wrote:
On March 08 2017 05:23 Silvanel wrote:
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.


But that's precisely what I'm arguing against. That's actually not the case. There are many possible systems, connected to the Internet, which cannot be hacked in any way; neither by some software exploit, nor by social engineering.

When you say this, you mean that they cannot be completely compromised? That the “hacker” could only gain access to a small part of the system, even through social engineering?


Well, you could always turn off the electricity and shut down the system. But I'm talking about things that are essentially feasible without a blatantly apocalyptic scenario like that.

Like I said before, let's say I have two computers. Their only function is that computer A will transmit over the Internet the word "foobar" and computer B will receive it, every hour. This can be set up in such a way that unless you turn off the electricity or cut the phone lines or convince Comcast to cancel your Internet service (things which we should assume an over-the-Internet hacker cannot), there's no way to stop the transmission, there's no way to alter the transmission, there's no way to broadcast a fake transmission to trick B into thinking it's A, etc.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
Deleted User 3420
Profile Blog Joined May 2003
24492 Posts
March 07 2017 20:39 GMT
#141419
On March 08 2017 05:32 ShoCkeyy wrote:
Thank goodness Travis CS master programmer is here :D Btw, grats on graduation if I'm getting that correctly.


haha no that was an in-thread joke
I won't graduate for a couple years still

as for the discussion I would just make the comment that it doesn't matter if a system is unhackable if it doesn't have practical application
ShoCkeyy
Profile Blog Joined July 2008
7815 Posts
Last Edited: 2017-03-07 20:42:04
March 07 2017 20:41 GMT
#141420
You all seem to forget that Stuxnet existed, which used no internet at all. Came in some of the software/hardware for the Nuclear power plant, and then self started. Not going to deep dive.
Life?
Prev 1 7069 7070 7071 7072 7073 10093 Next
Please log in or register to reply.
Live Events Refresh
Next event in 3h 59m
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
RuFF_SC2 191
NeuroSwarm 143
StarCraft: Brood War
Calm 3974
Shuttle 1256
Leta 281
Noble 21
Bale 15
Icarus 6
Dota 2
monkeys_forever410
League of Legends
JimRising 841
Counter-Strike
Coldzera 1552
Super Smash Bros
Mew2King43
Heroes of the Storm
Khaldor124
Other Games
summit1g19289
C9.Mang0304
ViBE152
Organizations
Other Games
gamesdonequick673
StarCraft: Brood War
UltimateBattle 106
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 15 non-featured ]
StarCraft 2
• Hupsaiya 104
• Adnapsc2 4
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• HerbMon 2
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
League of Legends
• Rush1270
• Lourlo804
Upcoming Events
OSC
3h 59m
Wardi Open
6h 59m
Monday Night Weeklies
11h 59m
OSC
17h 59m
Wardi Open
1d 6h
Replay Cast
2 days
Wardi Open
2 days
OSC
2 days
Tenacious Turtle Tussle
2 days
The PondCast
3 days
[ Show More ]
Replay Cast
3 days
OSC
4 days
LAN Event
4 days
Replay Cast
4 days
Replay Cast
5 days
Sparkling Tuna Cup
6 days
Replay Cast
6 days
Liquipedia Results

Completed

SOOP Univ League 2025
RSL Revival: Season 3
Eternal Conflict S1

Ongoing

C-Race Season 1
IPSL Winter 2025-26
KCM Race Survival 2025 Season 4
YSL S2
BSL Season 21
CSCL: Masked Kings S3
SLON Tour Season 2
META Madness #9
SL Budapest Major 2025
BLAST Rivals Fall 2025
IEM Chengdu 2025
PGL Masters Bucharest 2025
Thunderpick World Champ.
CS Asia Championships 2025
ESL Pro League S22
StarSeries Fall 2025
FISSURE Playground #2

Upcoming

BSL 21 Non-Korean Championship
Acropolis #4
IPSL Spring 2026
HSC XXVIII
RSL Offline Finals
WardiTV 2025
IEM Kraków 2026
BLAST Bounty Winter 2026
BLAST Bounty Winter 2026: Closed Qualifier
eXTREMESLAND 2025
ESL Impact League Season 8
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.