gfrlog comments on Techniques for probability estimates - Less Wrong

58 Post author: Yvain 04 January 2011 11:38PM

You are viewing a comment permalink. View the original post to see all comments and the full post content.

Comments (58)

You are viewing a single comment's thread. Show more comments above.

Comment author: gfrlog 06 January 2011 08:32:26PM *  1 point [-]

But there's no paranoia involved. It's cryptographically quite simple. All you need is a hash function.

Contrast with all of the governments and all of their security agents and such and nobody really trusts that it's secure.

Comment author: JGWeissman 06 January 2011 08:47:52PM 0 points [-]

All you need is a hash function.

A hash function on a die roll is quite vulnerable to a dictionary attack. You could add a salt, but this makes hash collisions easier to take advantage of.

Comment author: jimrandomh 06 January 2011 08:51:40PM 3 points [-]

You wouldn't use a hash function that people could generate collisions with, any more than you would use ROT-13.

Comment author: gfrlog 06 January 2011 09:13:38PM 0 points [-]

Of course a salt. Not sure why that would make hash collisions easier to take advantage of though. Presumably you use a good hash function.

Comment author: JGWeissman 06 January 2011 09:22:53PM 0 points [-]

The point is there are people who would not realize that you need a salt, or a hash function not vulnerable to collisions. Yes, there are existing solutions for this problem, but even choosing an existing solution from the space of security solutions to different problems is not trivial.

Comment author: gfrlog 06 January 2011 09:49:19PM 1 point [-]

Why does "some people don't know how this works" make it less trivial?