Back in 1990, this was legitimately stupid. It depends upon assumptions because the problem wasn't clearly specified, which I found out when I tried to write code to simulate it.
news.ycombinator.com/item?id=270922…
When Monty Hall opens a door, does the simulation code
1. pick one of the 3 doors at random?
2. pick one of the two remaining unchosen doors?
3. pick one of the two unchosen doors known to have a goat?
If the answer is #3, then yes, my simulation agreed with her answer: there's a 1/3rd chance the prize is behind the door you picked and a 2/3rd chance in the set of doors you didn't pick.
Taught me an important lesson about "software requirements". What appears as obviously specified breaks down when you attempt to put it into code.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Robᵉʳᵗ Graham😷, provocateur

Robᵉʳᵗ Graham😷, provocateur Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @ErrataRob

10 May
CEOs: your main exposure to ransomware comes from the ease of spreading within an organization, getting "domain admin". Just hire a pentester, give them an account on a typical employee desktop, and ask them to get domain admin.
"DarkSide" is simply a bunch of standard pentesters. They are doing the same sorts of things like running mimikatz. They'll find simple errors. Hire pentesters, give them a standard employee desktop, watch how they spread and get admin credentials.
I hate simple proscriptions like "just use multifactor authentication". Your problems might be different. For example, maybe your problem is that you've got the same local admin credentials in the image for all your desktop builds.
Read 6 tweets
10 May
This kind of nonsense is why we have NFTs. Stupid old reporters steeped in decades of DeBeers advertising falsely believe "natural" diamonds are better. They aren't -- they are worse than high quality manufactured diamonds in every way.
If people had any brains they'd pay more for manufactured diamonds, the quality is much better. And I'm not even talking about the environmental degradation, slave labor, and 'conflict' that comes from mining 'natural' diamonds.
I mean, I appreciate the certificate that comes with my "natural" diamond documenting the tons of earth that was strip mined (average 250 tonnes per carat), the lives lost, the limbs amputated, and so on. This certainly evokes emotions in me -- though maybe not the right ones.
Read 4 tweets
8 May
I took a long walk around downtown Portland today to check out the post apocalyptic landscape. I don't want to just point the camera at boarded up buildings -- here you can see non-boarded-up businesses across the street from boarded up ones.
It's hard to say which is worse, the pandemic lockdowns or the constant riots breaking windows, but large parts are taking it hard.
Some of the boarded up buildings are proactive to prevent damage, others are boarded up because their windows got smashed, such as this Starbucks, with boards replacing broken windows, but other windows uncovered.
Read 12 tweets
8 May
They shutdown pipeline operations to stop the ransomware from spreading. Question: why is the network constructed that allows things to spread? I mention this because the most common question everyone else is going to ask is "How did it breach the perimeter?".
When we get more details, they are going to blame this ransomware on a perimeter breach, like phishing or an unpatched server exposed to the public Internet.
Instead, we need to look at why the internal network allows such things to spread, like Windows networking permissions or port isolation on Ethernet switches.
Read 5 tweets
7 May
"It's impossible for two different files to have the same SHA256 hash"

Should I replace this with "nearly impossible"? The problem that while "nearly impossible" is more accurate, it's less precise. Saying "impossible" is less accurate but more precise.
Saying "nearly impossible" vastly overstates the possibility. It's like in Dumb and Dumber "so you are saying there's a chance!!!". No, the chance is essentially zero.
If it's possible, do it.
If you can't do it (and you can't) then it's impossible.

Anyway, I worry about "accurate" vs. "precision".
Read 4 tweets
3 May
Neither side pays attention to the science. It’s astonishing how little people pay attention to what the CDC actually says about masks.
It’s like in Germany where people are upset at the national curfew — especially the head of their medical institute who keeps pointing out how unscientific it is.
Curfews and mask mandates happen because they are the easiest to enforce not because they are the most scientific. I noticed that in the airport where everyone is masked but nobody socially distances Image
Read 18 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(