• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 23:25
CEST 05:25
KST 12:25
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
[ASL20] Ro24 Preview Pt1: Runway112v2 & SC: Evo Complete: Weekend Double Feature3Team Liquid Map Contest #21 - Presented by Monster Energy9uThermal's 2v2 Tour: $15,000 Main Event18Serral wins EWC 202549
Community News
Weekly Cups (Aug 11-17): MaxPax triples again!10Weekly Cups (Aug 4-10): MaxPax wins a triple6SC2's Safe House 2 - October 18 & 195Weekly Cups (Jul 28-Aug 3): herO doubles up6LiuLi Cup - August 2025 Tournaments7
StarCraft 2
General
RSL Revival patreon money discussion thread 2v2 & SC: Evo Complete: Weekend Double Feature Playing 1v1 for Cash? (Read before comment) Weekly Cups (Aug 11-17): MaxPax triples again! What mix of new and old maps do you want in the next 1v1 ladder pool? (SC2) :
Tourneys
$5,100+ SEL Season 2 Championship (SC: Evo) Sparkling Tuna Cup - Weekly Open Tournament RSL: Revival, a new crowdfunded tournament series LiuLi Cup - August 2025 Tournaments SEL Masters #5 - Korea vs Russia (SC Evo)
Strategy
Custom Maps
External Content
Mutation # 487 Think Fast Mutation # 486 Watch the Skies Mutation # 485 Death from Below Mutation # 484 Magnetic Pull
Brood War
General
Flash Announces (and Retracts) Hiatus From ASL BW General Discussion ASL 20 HYPE VIDEO! New season has just come in ladder [ASL20] Ro24 Preview Pt1: Runway
Tourneys
[ASL20] Ro24 Group B [Megathread] Daily Proleagues [ASL20] Ro24 Group A BWCL Season 63 Announcement
Strategy
Simple Questions, Simple Answers Fighting Spirit mining rates [G] Mineral Boosting Muta micro map competition
Other Games
General Games
Stormgate/Frost Giant Megathread Nintendo Switch Thread Total Annihilation Server - TAForever Beyond All Reason [MMORPG] Tree of Savior (Successor of Ragnarok)
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread Vanilla Mini Mafia
Community
General
Russo-Ukrainian War Thread US Politics Mega-thread Things Aren’t Peaceful in Palestine European Politico-economics QA Mega-thread The Games Industry And ATVI
Fan Clubs
INnoVation Fan Club SKT1 Classic Fan Club!
Media & Entertainment
Anime Discussion Thread Movie Discussion! [Manga] One Piece [\m/] Heavy Metal Thread
Sports
2024 - 2026 Football Thread TeamLiquid Health and Fitness Initiative For 2023 Formula 1 Discussion
World Cup 2022
Tech Support
Gtx660 graphics card replacement Installation of Windows 10 suck at "just a moment" Computer Build, Upgrade & Buying Resource Thread
TL Community
TeamLiquid Team Shirt On Sale The Automated Ban List
Blogs
The Biochemical Cost of Gami…
TrAiDoS
[Girl blog} My fema…
artosisisthebest
Sharpening the Filtration…
frozenclaw
ASL S20 English Commentary…
namkraft
StarCraft improvement
iopq
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1529 users

US Politics Mega-thread - Page 7071

Forum Index > Closed
Post a Reply
Prev 1 7069 7070 7071 7072 7073 10093 Next
Read the rules in the OP before posting, please.

In order to ensure that this thread continues to meet TL standards and follows the proper guidelines, we will be enforcing the rules in the OP more strictly. Be sure to give them a re-read to refresh your memory! The vast majority of you are contributing in a healthy way, keep it up!

NOTE: When providing a source, explain why you feel it is relevant and what purpose it adds to the discussion if it's not obvious.
Also take note that unsubstantiated tweets/posts meant only to rekindle old arguments can result in a mod action.
LightSpectra
Profile Blog Joined October 2011
United States1542 Posts
Last Edited: 2017-03-07 19:47:58
March 07 2017 19:47 GMT
#141401
On March 08 2017 04:40 ShoCkeyy wrote:
"Reverse engineer the algorithm" right... If you have the algorithm in your hands, there's no need to reverse engineer anything, you've already broke into the database/server...


What do you mean by "algorithm"? If you mean the cryptographic cipher/hash function, then no. There's plenty of those that have no currently known exploit.

https://en.wikipedia.org/wiki/Hash_function_security_summary
https://en.wikipedia.org/wiki/Cipher_security_summary

On March 08 2017 04:41 LegalLord wrote:
Show nested quote +
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
On March 08 2017 04:15 LightSpectra wrote:
I am asking for some proof of the claim "anything connected to the Internet can be hacked".

Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
LegalLord
Profile Blog Joined April 2013
United Kingdom13775 Posts
Last Edited: 2017-03-07 19:49:56
March 07 2017 19:49 GMT
#141402
On March 08 2017 04:47 LightSpectra wrote:
Show nested quote +
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
On March 08 2017 04:15 LightSpectra wrote:
I am asking for some proof of the claim "anything connected to the Internet can be hacked".

Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States1542 Posts
March 07 2017 19:54 GMT
#141403
On March 08 2017 04:49 LegalLord wrote:
Show nested quote +
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
On March 08 2017 04:15 LightSpectra wrote:
I am asking for some proof of the claim "anything connected to the Internet can be hacked".

Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
LegalLord
Profile Blog Joined April 2013
United Kingdom13775 Posts
March 07 2017 19:58 GMT
#141404
On March 08 2017 04:54 LightSpectra wrote:
Show nested quote +
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
On March 08 2017 04:17 LegalLord wrote:
[quote]
Remember when I made that claim? No? Then maybe you should learn to read more carefully.


Hmmm...

On March 08 2017 03:09 LegalLord wrote:
It's certainly not a "Wild West" of "anything out there can be hacked whenever you want" but it's very far from "nothing can be hacked if it has good security practices."


Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States1542 Posts
March 07 2017 20:00 GMT
#141405
On March 08 2017 04:58 LegalLord wrote:
Show nested quote +
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
On March 08 2017 04:20 LightSpectra wrote:
[quote]

Hmmm...

[quote]

Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
Deleted User 3420
Profile Blog Joined May 2003
24492 Posts
March 07 2017 20:12 GMT
#141406
what is the point of what you guys are arguing about again?
LegalLord
Profile Blog Joined April 2013
United Kingdom13775 Posts
Last Edited: 2017-03-07 20:18:10
March 07 2017 20:16 GMT
#141407
On March 08 2017 05:00 LightSpectra wrote:
Show nested quote +
On March 08 2017 04:58 LegalLord wrote:
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
On March 08 2017 04:23 LegalLord wrote:
[quote]
Fine, last try to see if you're just bullshitting or saying something useful.

Please state the definition of "hacking" that you are using in the context of your statement.


Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.

Well even the paper you cited wouldn't go nearly as far as to call it "theoretically unhackable" or anything of the sort - it only promises "strong security guarantees" under a set of (fairly reasonable, but far from guaranteed) assumptions such as compiler/assembler/physical correctness. And you even say that it is "theoretically vulnerable."

So if that one isn't "theoretically unhackable" could you point to what context the blockchain is "theoretically invulnerable" in? Even the IBM marketing pages don't make quite so strong a claim. Even among the "we so secure" bluster they have.
History will sooner or later sweep the European Union away without mercy.
LegalLord
Profile Blog Joined April 2013
United Kingdom13775 Posts
March 07 2017 20:17 GMT
#141408
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?

At this point? Clarification on his statement that "some systems are not hackable" and what context he means that in.
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States1542 Posts
March 07 2017 20:20 GMT
#141409
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?


The idea that hacking is impossible to deter if you want Internet-based infrastructure.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
Plansix
Profile Blog Joined April 2011
United States60190 Posts
March 07 2017 20:21 GMT
#141410
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?

This is about forcing a professional in a field to admit that a novice is correct when making an overly broad, simplistic claim about intern security. The professional wants to have a more nuanced, specific discussion about security. The novice just wants to make sweeping claims and generalizations.
I have the Honor to be your Obedient Servant, P.6
TL+ Member
Silvanel
Profile Blog Joined March 2003
Poland4730 Posts
March 07 2017 20:23 GMT
#141411
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.
Pathetic Greta hater.
Danglars
Profile Blog Joined August 2010
United States12133 Posts
March 07 2017 20:26 GMT
#141412
On March 08 2017 05:12 travis wrote:
what is the point of what you guys are arguing about again?

LightSpectra trying to prove two people fools on the subject of cybersecurity in wikileaks era (Illustration "Finally, somebody in this thread besides Mohdoo and myself that knows something about cybersecurity.")
To which everything goes to semantics and contexts.
To try to disprove a point what wasn't actually made. ("The idea that hacking is impossible to deter if you want Internet-based infrastructure.")

Show nested quote +
On March 08 2017 02:09 LightSpectra wrote:
On March 08 2017 02:04 RealityIsKing wrote:
Anyone works in IT already know once you are connected to a network, anything is hackable.


Sorry, that's really just not true. I really hope you don't work in IT for anything important.

On March 08 2017 02:04 Plansix wrote:
We have been to soft on wikileaks and unwilling to deal with them head on. We had the ability to assert enough political pressure to deal with them a long time ago, but no one wanted to. Hopefully that will change, because they are not going away.


Is this sarcasm? I would've thought you were a big WikiLeaks proponent.

Great armies come from happy zealots, and happy zealots come from California!
TL+ Member
LightSpectra
Profile Blog Joined October 2011
United States1542 Posts
March 07 2017 20:26 GMT
#141413
On March 08 2017 05:16 LegalLord wrote:
Show nested quote +
On March 08 2017 05:00 LightSpectra wrote:
On March 08 2017 04:58 LegalLord wrote:
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
On March 08 2017 04:28 LightSpectra wrote:
[quote]

Gaining some arbitrary power over a system/data that was not lawfully or intentionally given.

EDIT: I should probably add "... via electronic means" so that it's not misconstrued to possibly include "hitting the superuser with a wrench until he gives up the password."

And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.

Well even the paper you cited wouldn't go nearly as far as to call it "theoretically unhackable" or anything of the sort - it only promises "strong security guarantees" under a set of (fairly reasonable, but far from guaranteed) assumptions such as compiler/assembler/physical correctness. And you even say that it is "theoretically vulnerable."

So if that one isn't "theoretically unhackable" could you point to what context the blockchain is "theoretically invulnerable" in? Even the IBM marketing pages don't make quite so strong a claim. Even among the "we so secure" bluster they have.


No, read the abstract from the citation [16]: the software part of seL4 is theoretically invulnerable to any kind of error.

Blockchain is also the same way by design. Read about how it works: https://en.wikipedia.org/wiki/Blockchain_(database)#Description
Due to its decentralized nature, you would have to compromise 51% of the population in order to forge a transaction. Even if you found some exploit in the software, it would have to be simultaneously exploited on 51% of all those with a copy of the database. At that point, you've basically hacked everybody in the entire world, which is beyond all theoretical feasibility until Skynet is real life.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
LightSpectra
Profile Blog Joined October 2011
United States1542 Posts
March 07 2017 20:27 GMT
#141414
On March 08 2017 05:23 Silvanel wrote:
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.


But that's precisely what I'm arguing against. That's actually not the case. There are many possible systems, connected to the Internet, which cannot be hacked in any way; neither by some software exploit, nor by social engineering.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
ShoCkeyy
Profile Blog Joined July 2008
7815 Posts
March 07 2017 20:32 GMT
#141415
Thank goodness Travis CS master programmer is here :D Btw, grats on graduation if I'm getting that correctly.
Life?
Plansix
Profile Blog Joined April 2011
United States60190 Posts
March 07 2017 20:32 GMT
#141416
On March 08 2017 05:27 LightSpectra wrote:
Show nested quote +
On March 08 2017 05:23 Silvanel wrote:
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.


But that's precisely what I'm arguing against. That's actually not the case. There are many possible systems, connected to the Internet, which cannot be hacked in any way; neither by some software exploit, nor by social engineering.

When you say this, you mean that they cannot be completely compromised? That the “hacker” could only gain access to a small part of the system, even through social engineering?
I have the Honor to be your Obedient Servant, P.6
TL+ Member
LegalLord
Profile Blog Joined April 2013
United Kingdom13775 Posts
March 07 2017 20:33 GMT
#141417
On March 08 2017 05:26 LightSpectra wrote:
Show nested quote +
On March 08 2017 05:16 LegalLord wrote:
On March 08 2017 05:00 LightSpectra wrote:
On March 08 2017 04:58 LegalLord wrote:
On March 08 2017 04:54 LightSpectra wrote:
On March 08 2017 04:49 LegalLord wrote:
On March 08 2017 04:47 LightSpectra wrote:
On March 08 2017 04:41 LegalLord wrote:
On March 08 2017 04:36 LightSpectra wrote:
On March 08 2017 04:32 LegalLord wrote:
[quote]
And does that include social engineering and/or fooling an employee into giving you access to the network?


Yes, I do include that. But here's the thing to note about that: Not all major systems have a human-vulnerable element, where you can trick the superuser or military officer into doing something nefarious. Like I mentioned before, the blockchain that's going to replace our financial transaction systems in the near future is essentially unhackable. You can defraud one person's particular account (like 'stealing' their Bitcoin wallet), but there's absolutely no way to take control over the entire registry.

In that case, also explain what you mean by "theoretically unhackable."


Meaning there's been a scholarly paper that mathematically demonstrates that there is no possible way to compromise a particular system.

Mathematical proofs are much more formal in their definitions than you are being right now. I suppose an example of a paper that shows something to be "proven unhackable" would not be difficult to show then.


"A formal proof of functional correctness was completed in 2009.[16] The proof provides a guarantee that the kernel's implementation is correct against its specification, and implies that it is free of implementation bugs such as deadlocks, livelocks, buffer overflows, arithmetic exceptions or use of uninitialised variables. seL4 is claimed to be the first-ever general-purpose operating-system kernel that has been verified.[16]"

https://en.wikipedia.org/wiki/L4_microkernel_family#High_assurance:_seL4

So then your definition of "theoretically unhackable" is "complete formal verification of functional correctness" in this context?


Yes.

But that's a tough standard to hold to. That's why I say that many things are not practically hackable but they are theoretically vulnerable. Then there are in fact things that are theoretically invulnerable, like the blockchain.

Well even the paper you cited wouldn't go nearly as far as to call it "theoretically unhackable" or anything of the sort - it only promises "strong security guarantees" under a set of (fairly reasonable, but far from guaranteed) assumptions such as compiler/assembler/physical correctness. And you even say that it is "theoretically vulnerable."

So if that one isn't "theoretically unhackable" could you point to what context the blockchain is "theoretically invulnerable" in? Even the IBM marketing pages don't make quite so strong a claim. Even among the "we so secure" bluster they have.


No, read the abstract from the citation [16]: the software part of seL4 is theoretically invulnerable to any kind of error.

Blockchain is also the same way by design. Read about how it works: https://en.wikipedia.org/wiki/Blockchain_(database)#Description
Due to its decentralized nature, you would have to compromise 51% of the population in order to forge a transaction. Even if you found some exploit in the software, it would have to be simultaneously exploited on 51% of all those with a copy of the database. At that point, you've basically hacked everybody in the entire world, which is beyond all theoretical feasibility until Skynet is real life.

Complete formal verification is the only known way
to guarantee that a system is free of programming
errors.
We present our experience in performing the for-
mal, machine-checked verification of the seL4 mi-
crokernel from an abstract specification down to its
C implementation. We assume correctness of com-
piler, assembly code, and hardware, and we used a
unique design approach that fuses formal and oper-
ating systems techniques. To our knowledge, this is
the first formal proof of functional correctness of a
complete, general-purpose operating-system kernel.
Functional correctness means here that the implemen-
tation always strictly follows our high-level abstract
specification of kernel behaviour. This encompasses
traditional design and implementation safety proper-
ties such as the kernel will never crash, and it will
never perform an unsafe operation. It also proves
much more: we can predict precisely how the kernel
will behave in every possible situation.
seL4, a third-generation microkernel of L4 prove-
nance, comprises 8,700 lines of C code and 600 lines
of assembler. Its performance is comparable to other
high-performance L4 kernels.


Do explain which part of that makes the statement that you are trying to justify. You are being extremely imprecise with definitions here.

And specifically, what context is blockchain invulnerable in (yes, it has useful features, but what makes it theoretically invulnerable)? You make a statement of "theoretically invulnerable" and say it's "mathematically proven" without providing any of the formal specificity that a mathematical proof would require.
History will sooner or later sweep the European Union away without mercy.
LightSpectra
Profile Blog Joined October 2011
United States1542 Posts
March 07 2017 20:36 GMT
#141418
On March 08 2017 05:32 Plansix wrote:
Show nested quote +
On March 08 2017 05:27 LightSpectra wrote:
On March 08 2017 05:23 Silvanel wrote:
Its doesnt matter if something is ""theoretically unhackable". In practice everything is made by humans and is prone to errors. hence exploits are always possible.


But that's precisely what I'm arguing against. That's actually not the case. There are many possible systems, connected to the Internet, which cannot be hacked in any way; neither by some software exploit, nor by social engineering.

When you say this, you mean that they cannot be completely compromised? That the “hacker” could only gain access to a small part of the system, even through social engineering?


Well, you could always turn off the electricity and shut down the system. But I'm talking about things that are essentially feasible without a blatantly apocalyptic scenario like that.

Like I said before, let's say I have two computers. Their only function is that computer A will transmit over the Internet the word "foobar" and computer B will receive it, every hour. This can be set up in such a way that unless you turn off the electricity or cut the phone lines or convince Comcast to cancel your Internet service (things which we should assume an over-the-Internet hacker cannot), there's no way to stop the transmission, there's no way to alter the transmission, there's no way to broadcast a fake transmission to trick B into thinking it's A, etc.
2006 Shinhan Bank OSL Season 3 was the greatest tournament of all time
Deleted User 3420
Profile Blog Joined May 2003
24492 Posts
March 07 2017 20:39 GMT
#141419
On March 08 2017 05:32 ShoCkeyy wrote:
Thank goodness Travis CS master programmer is here :D Btw, grats on graduation if I'm getting that correctly.


haha no that was an in-thread joke
I won't graduate for a couple years still

as for the discussion I would just make the comment that it doesn't matter if a system is unhackable if it doesn't have practical application
ShoCkeyy
Profile Blog Joined July 2008
7815 Posts
Last Edited: 2017-03-07 20:42:04
March 07 2017 20:41 GMT
#141420
You all seem to forget that Stuxnet existed, which used no internet at all. Came in some of the software/hardware for the Nuclear power plant, and then self started. Not going to deep dive.
Life?
Prev 1 7069 7070 7071 7072 7073 10093 Next
Please log in or register to reply.
Live Events Refresh
PiGosaur Monday
00:00
#45
PiGStarcraft470
SteadfastSC70
davetesta20
Liquipedia
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
PiGStarcraft470
Nina 191
SteadfastSC 70
StarCraft: Brood War
PianO 170
Bale 115
ggaemo 81
NaDa 53
Icarus 5
Dota 2
monkeys_forever888
LuMiX1
Counter-Strike
C9.Mang0449
Coldzera 192
Stewie2K170
Super Smash Bros
hungrybox792
Other Games
summit1g11180
ViBE197
Maynarde146
Trikslyr54
Livibee48
kaitlyn12
Organizations
Other Games
gamesdonequick1118
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 14 non-featured ]
StarCraft 2
• Berry_CruncH200
• practicex 25
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
League of Legends
• Rush671
Counter-Strike
• Shiphtur329
Upcoming Events
Afreeca Starleague
6h 35m
Mini vs TBD
Soma vs sSak
WardiTV Summer Champion…
7h 35m
Clem vs goblin
ByuN vs SHIN
Online Event
20h 35m
The PondCast
1d 6h
WardiTV Summer Champion…
1d 7h
Zoun vs Bunny
herO vs Solar
Replay Cast
1d 20h
LiuLi Cup
2 days
BSL Team Wars
2 days
Team Hawk vs Team Dewalt
Korean StarCraft League
2 days
CranKy Ducklings
3 days
[ Show More ]
SC Evo League
3 days
WardiTV Summer Champion…
3 days
Classic vs Percival
Spirit vs NightMare
[BSL 2025] Weekly
3 days
Sparkling Tuna Cup
4 days
SC Evo League
4 days
BSL Team Wars
4 days
Team Bonyth vs Team Sziky
Afreeca Starleague
5 days
Queen vs HyuN
EffOrt vs Calm
Wardi Open
5 days
Replay Cast
5 days
Afreeca Starleague
6 days
Rush vs TBD
Jaedong vs Mong
Liquipedia Results

Completed

Jiahua Invitational
uThermal 2v2 Main Event
HCC Europe

Ongoing

Copa Latinoamericana 4
BSL 20 Team Wars
KCM Race Survival 2025 Season 3
BSL 21 Qualifiers
ASL Season 20
CSL Season 18: Qualifier 1
SEL Season 2 Championship
WardiTV Summer 2025
Esports World Cup 2025
BLAST Bounty Fall 2025
BLAST Bounty Fall Qual
IEM Cologne 2025
FISSURE Playground #1
BLAST.tv Austin Major 2025

Upcoming

CSLAN 3
CSL 2025 AUTUMN (S18)
LASL Season 20
BSL Season 21
BSL 21 Team A
Chzzk MurlocKing SC1 vs SC2 Cup #2
RSL Revival: Season 2
Maestros of the Game
EC S1
PGL Masters Bucharest 2025
MESA Nomadic Masters Fall
Thunderpick World Champ.
CS Asia Championships 2025
Roobet Cup 2025
ESL Pro League S22
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.