"It's impossible for two different files to have the same SHA256 hash"

Should I replace this with "nearly impossible"? The problem that while "nearly impossible" is more accurate, it's less precise. Saying "impossible" is less accurate but more precise.
Saying "nearly impossible" vastly overstates the possibility. It's like in Dumb and Dumber "so you are saying there's a chance!!!". No, the chance is essentially zero.
If it's possible, do it.
If you can't do it (and you can't) then it's impossible.

Anyway, I worry about "accurate" vs. "precision".
I'm over 5ft tall. this is 100% accurate, but only about 80% precise.
I'm 5ft 10inches. This is inaccurate, but 98% precise.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Robᵉʳᵗ Graham😷, provocateur

Robᵉʳᵗ Graham😷, provocateur Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @ErrataRob

8 May
I took a long walk around downtown Portland today to check out the post apocalyptic landscape. I don't want to just point the camera at boarded up buildings -- here you can see non-boarded-up businesses across the street from boarded up ones. Image
It's hard to say which is worse, the pandemic lockdowns or the constant riots breaking windows, but large parts are taking it hard. Image
Some of the boarded up buildings are proactive to prevent damage, others are boarded up because their windows got smashed, such as this Starbucks, with boards replacing broken windows, but other windows uncovered. Image
Read 12 tweets
8 May
They shutdown pipeline operations to stop the ransomware from spreading. Question: why is the network constructed that allows things to spread? I mention this because the most common question everyone else is going to ask is "How did it breach the perimeter?".
When we get more details, they are going to blame this ransomware on a perimeter breach, like phishing or an unpatched server exposed to the public Internet.
Instead, we need to look at why the internal network allows such things to spread, like Windows networking permissions or port isolation on Ethernet switches.
Read 5 tweets
3 May
Neither side pays attention to the science. It’s astonishing how little people pay attention to what the CDC actually says about masks.
It’s like in Germany where people are upset at the national curfew — especially the head of their medical institute who keeps pointing out how unscientific it is.
Curfews and mask mandates happen because they are the easiest to enforce not because they are the most scientific. I noticed that in the airport where everyone is masked but nobody socially distances Image
Read 18 tweets
30 Apr
#hackerproblems

How it started: This hotel has a TV with a barcode I can scan to control the TV from my phone???

How's it going:
(screenshot edited to remove most of the cookie) Image
The natural urge of hackers when they see some new networked thingy is to hack it. Simple knowledge of the TV set in the previous screenshot appears to be insufficient to control the TV, I also need the session cookie that was given by following the QRcode.
So what you see in the screenshot is the minimum HTTP request (that normally comes from browsers) that I can craft by hand to change the channel
Read 4 tweets
30 Apr
Current status: I’m in an Uber!!! First time since the pandemic started. I’m so excited.
Both the driver and I are vaccinated. I offered to take off my mask if he took off his. He wouldn’t go for it.
People suck at the social distancing at the airport Image
Read 5 tweets
30 Apr
In first grade, my mom got me a "Brainteaser" book that was way to advanced for my grade level, which I read obsessively, learning such things as the frequency of letters (ETAONS...) to solve cryptograms, among other things.
Both my parents valued learning and were reading books or taking classes all the time. They both inspired me that anything was in my grasp to learn if I tried. So I learned how things worked, including computers.
A lot of hacking is simply taking the time to learn that thing that everyone else believes to be unnecessarily or too complicated beyond their abilities. I took the time.
Read 9 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(