Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "alice and bob"
-
After reading a lot of cryptography, I realized that it would be best if Alice and Bob just talk in person13
-
I've put my nose down the books regarding cryptology quite alot lately, and at the end of the day, I really think that Bob and Alice should just meet and talk in person.4
-
!dev
lol I keep getting in trouble over people taking secondhand-offense, and managers keep bringing up the same instances like I’m somehow at fault.
Look, if Alice says something to Bob, and Carol hears it and gets offended on Bob’s behalf, but Bob doesn’t? Carol should jump off a bridge.10 -
The year was 2021 and we have to implement X
Alice, the manager: let's do this and this
Me: actually that won't scale, I did the same in my previous company. Here's an analysis on why it doesn't scale
Alice: nope, we'll have to do it like that. If it doesn't scale we'll fix it. It's a learning opportunity.
The feature was rolled out, and we got tons of alerts after 1 week.
Alice: haha what a ride! At least the team learned something new
Me: I didn't learn anything new. All I got was stress and disrupted sleep because of those midnight incidents...
Then 2022 came, Alice was promoted thanks to the incredible leadership to deliver X, I joined a different project, a part of this project is to implement Y, similar to X.
Bob, the manager: let's do this and this
Me: actually that won't scale, I did the same in my previous project. Here's an analysis on why it doesn't scale, you can ask Alice if you want.
Bob: nope, we'll have to do it like that. If it doesn't scale we'll fix it. It's a learning opportunity.
The feature was rolled out, and we got tons of alerts after 1 week.
Bob: haha what a ride! At least the team learned something new
Me: I didn't learn anything new. All I got was stress and disrupted sleep because of those midnight incidents...
It's 2023 now, Bob got promoted thanks to the awesome leadership to roll out Y, I joined another project, which requires us to develop Z, similar to X and Y.
Chris, the manager: let's do this and this
Me: ah shit here we go again...4 -
I'm in 3rd year of my CS degree....
Fucking Indian Education System
I'm having a subject css(cryptography & system security)... The bitch who teaches us doesn't know shit.... She just picks random words from the ppt & blabber random bullshit...
Last week we had our unit tests...and the question was explain Working of deffie-helman. Just because I didn't use the names Alice & Bob in the example she didn't gave me marks....I mean wtf..that was just an example mentioned in the slides.....
I bet it wasn't required at all...
I knew most of the things they teach here..
These mofo professors have just a CS degree and they are here to teach the same course....10 -
So someone decides that the employees need to do these stupid Web-based training's that not even high school kids should be looking into.
What is about ?
Security and Cryptography, and now event the real stuff.
What it covers?
Alice and Bob, Bob and Alice.
Alice wants Bob some pics/messages that she suspects someone else will see. DDDDDDAAAAAAAFFFFFFFAAAAAAAAAKKKKKK
A total of 7 useless time wasting interactive and annoying training's, 20+ min each.
But someone forgot that please do not send this shit to engineers of your company, specially Software/Network engineers. Oh another subset, specially not to those who work deeper into the domain.
I'm getting paid to do this time wasting activity, and still.
I also may come back and remove this BUT FOR NOW I NEED TO RANT.rant alice time_waste boolsheet web_training useless fake_security demotivators bob corporate_crap foo -
A puzzle, just for fun.
Two friends, (a)lice and (b)ob are communicating through a channel encrypted with random numbers XOR'd together, like so:
keyA = randint(1024, 1024**2)
keyB = randint(1024, 1024**2)
msg = randint(1024, 1024**2)
You, an interloper, have watched all these communications, siphoning the packets as they went.
When alice sends a message to bob's mailbox, she does it like so:
mailBoxB = keyA^msg
Bob's mailbox receives the mail automatically, and applies his own key, sending it back to alice's mailbox:
mailBoxA = keyB^mailBoxB
Next, Alice's mailbox notices the message, and automatically removes her key and sends it back to bob's mailbox. All of this, the first message, the second, and the third, happens in milliseconds, the back and forth.
mailBoxB2 = mailBoxA^keyA
Finally, bob's mailbox removes his key, and deposits the now unencrypted message in his box, for him to read in the morning:
mailBoxBFinal = mailBoxB2^keyB
As as a spy, you know the first packet sent to bob, had a value of 589505.
The packet bob sent back to alice, after applying his key, has a value of 326166
The message sent *back* to bob after alice removed *her* key, had a value of:
576941
What are the values of keyA, keyB, and what is the value of the msg?4 -
I had to write a script to clean some crap from a database.
In particular it had some records containing multiple names and I had to split them.
It was really a nightmare because the separator was not always the same, e.g. "John, Mark and Bob" or "Alice+Mary".
«Ok, let's use a fucking regex: ",|(and)|\\+|/|&"»
Then, I realized there were some "Alessandro" in the database. Yeah, Aless(and)ro. Shit.
So I had eventually added more crap into the database.6 -
Riddle:
Alice and bob want to communicate a secret message, lets say it is an integer.
We will call this msg0.
You are Chuck, an interloper trying to spy on them and decode the message.
For keys, alice chooses a random integer w, another for x, and another for y. she also calculates a fourth variable, x+y = z
Bob follows the same procedure.
Suppose the numbers are too large to bruteforce.
Their exchange looks like this.
At step 1, alice calculates the following:
msg1 = alice.z+alice.w+msg0
she sends this message over the internet to bob.
the value of msg1 is 20838
then for our second step of the process, bob calculates msg2 = bob.z+bob.w+msg1
msg2 equals 32521
he then sends msg2 to alice, and again, you intercept and observe.
at step three, alice recieves bob's message, and calculates the following: msg3 = msg2-(alice.x+alice.w+msg0)
msg3 equals 19249. Alice sends this to bob.
bob calculates msg4 = msg3-(bob.x+bob.w)
msg4 equals 11000.
he sends msg4 to alice
at this stage, alice calculates ms5.
msg5 = (msg4-(alice.y)+msg0.
alice sends this to bob.
bob recieves this final message and calculates
the sixth and final message, which is the original hidden msg0 alice wanted to send:
msg6 = msg5-bob.y
What is the secret message?
I'll give anyone who solves it without bruteforcing, a free cookie.18 -
Every data communication example has Alice and Bob communicating with each other. I wonder after all these years how are they able to maintain a stable relationship.
I wish my girlfriend understood this. -
!rant
This is more of a thought-related post. In the morning I stumbled across an article about artificial intelligence and the research from Facebook. I couldn't get around the thought of Elon Musk warning the people about uncontrolled developing of AI. The article was written about the experiment of Facebook, where two bots (Bob and Alice) were told to communicate with each other. As the developers "forgot" to implement a reward for using the English language, the bots started to change the grammar and spelling. They invented their own english-styled language, removing words that were too complex in their opinion. As soon as this happened, the researchers stopped the experiment, stating that they "couldn't follow what the bots were saying".
I wouldn't call myself a neural network expert, but I can understand why the bots could have behaved like that. But: Imagine that we invent an artificial intelligence with greater responsibility and just "forget" the reward for a specific task. If the AI will then try to increase it's own efficiency, I believe that we will be in alot of trouble.
Any thoughts on this are highly appreciated, as I think that this is a topic we should all look into (especially on a platform for developers).
Original article (german): http://gamestar.de/artikel/...3